skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: "We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together
Digital resources are often collectively owned and shared by small social groups (e.g., friends sharing Netflix accounts, roommates sharing game consoles, families sharing WhatsApp groups). Yet, little is known about (i) how these groups jointly navigate cybersecurity and privacy (S&P) decisions for shared resources, (ii) how shared experiences influence individual S&P attitudes and behaviors, and (iii) how well existing S&P controls map onto group needs. We conducted group interviews and a supplemental diary study with nine social groups (n=34) of varying relationship types. We identified why, how and what resources groups shared, their jointly construed threat models, and how these factors influenced group strategies for securing shared resources. We also identified missed opportunities for cooperation and stewardship among group members that could have led to improved S&P behaviors, and found that existing S&P controls often fail to meet the needs of these small social groups.  more » « less
Award ID(s):
1755625
PAR ID:
10160147
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
Page Range / eLocation ID:
1 to 12
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    We present results from a qualitative study involving eight intergenerational families (27 participants) to understand how a family tracking intervention can help support care among intergenerational family members. Our findings show that family members communicate and stay aware of each other's' health through shared fitness data and conversations triggered by fitness sharing. We identified different challenges and preferences among the three age groups in our study: older adults enjoyed family fitness sharing but often encountered various technical challenges, the middle-aged group served as a key person to care for the rest of the family members, and the young generation could not fully engage in fitness sharing due to their busy schedule and privacy concerns. These findings suggest the design of family fitness sharing to account for the age differences in intergenerational families and support the unique needs of family fitness sharing. 
    more » « less
  2. Intraspecific variation in morphology and behavior is widespread, especially in species with large distribution ranges. This includes foraging which can vary according to the local resource landscape. How this may be linked to differences in social structure, especially in socially foraging species is less known. Greater spear-nosed bats are well known for their large repertoire of often highly complex social behaviors. In Trinidad, they form stable groups of unrelated females that recruit other members to temporally unpredictable flowering balsa trees. We compared these findings with a dataset of capture data, GPS tracks, and observations collected over six years in a colony in Panamá. We found profound differences in the foraging behavior and group stability ofPhyllostomus hastatusduring the dry season where social behaviors were expected. Female bats did not coordinate commutes to exploit distinct foraging resources as a group. Instead, females commuted individually to very distant foraging areas which overlapped between groups. Linked to this we found groups to be unstable in size over the short and long term. Our findings highlight the large intraspecific variation and indicate a strong influence of the local resource landscape and associated benefits of social foraging on the social structure in these bats and possibly many other animals. 
    more » « less
  3. What triggers end-user security and privacy (S&P) behaviors? How do those triggers vary across individuals? When and how do people share their S&P behavior changes? Prior work, in usable security and persuasive design, suggests that answering these questions is critical if we are to design systems that encourage pro-S&P behaviors. Accordingly, we asked 852 online survey respondents about their most recent S&P behaviors (n = 1947), what led up to those behaviors, and if they shared those behaviors. We found that social “triggers”, where people interacted with or observed others, were most common, followed by proactive triggers, where people acted absent of an external stimulus, and lastly by forced triggers, where people were forced to act. People from different age groups, nationalities, and levels of security behavioral intention (SBI) all varied in which triggers were dominant. Most importantly, people with low-to-medium SBI most commonly reported social triggers. Furthermore, participants were four times more likely to share their behavior changes with others when they, themselves, reported a social trigger. 
    more » « less
  4. While most online accounts are designed assuming a single user, past work has found that romantic couples often share many accounts. Our study examines couples' account sharing behaviors as their relationships develop. We conducted 19 semi-structured interviews with people who are currently in romantic relationships to understand couples' account sharing behaviors over the lifecycle of their relationship. We find that account sharing behaviors progress through a relationship where major changes happen at the start of cohabitation, marriage, and occasional breakup. We also find that sharing behaviors and motivations are influenced by couples' relationship ecology, which consists of the dynamics between the couples and the social environment they live in. Based on these findings, we discuss implications for further study to support couples' sharing needs at different relationship stages and identify design opportunities for technology solutions to facilitate couples' sharing. 
    more » « less
  5. Security design choices often fail to take into account users' social context. Our work is among the first to examine security behavior in romantic relationships. We surveyed 195 people on Amazon Mechanical Turk about their relationship status and account sharing behavior for a cross-section of popular websites and apps (e.g., Netflix, Amazon Prime). We examine differences in account sharing behavior at different stages in a relationship and for people in different age groups and income levels. We also present a taxonomy of sharing motivations and behaviors based on the iterative coding of open-ended responses. Based on this taxonomy, we present design recommendations to support end users in three relationship stages: when they start sharing access with romantic partners; when they are maintaining that sharing; and when they decide to stop. Our findings contribute to the field of usable privacy and security by enhancing our understanding of security and privacy behaviors and needs in intimate social relationships. 
    more » « less