skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: A Typology of Perceived Triggers for End-User Security and Privacy Behaviors
What triggers end-user security and privacy (S&P) behaviors? How do those triggers vary across individuals? When and how do people share their S&P behavior changes? Prior work, in usable security and persuasive design, suggests that answering these questions is critical if we are to design systems that encourage pro-S&P behaviors. Accordingly, we asked 852 online survey respondents about their most recent S&P behaviors (n = 1947), what led up to those behaviors, and if they shared those behaviors. We found that social “triggers”, where people interacted with or observed others, were most common, followed by proactive triggers, where people acted absent of an external stimulus, and lastly by forced triggers, where people were forced to act. People from different age groups, nationalities, and levels of security behavioral intention (SBI) all varied in which triggers were dominant. Most importantly, people with low-to-medium SBI most commonly reported social triggers. Furthermore, participants were four times more likely to share their behavior changes with others when they, themselves, reported a social trigger.  more » « less
Award ID(s):
1755625
PAR ID:
10160148
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
USENIX Symposium on Usable Privacy and Security (SOUPS)
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and “bring your own technology” initiatives, attention to these topics is becoming increasingly important. A total of 593 middle school students were surveyed about digital footprints and concerns about social media. The results show that 17% started using social media at age nine or younger, 40% accepted friend requests from people they do not know, and 40% reported that their parents did not monitor their social media use, which calls for the needs of cyber-security education. These middle school students reported using social media most often to connect with their friends, share pictures, and find out what others are doing. They indicated that Instagram (27%), SnapChat (25%) and YouTube (25%) were their most used social media sites. These students have concerns about social media due to inappropriate postings, getting hacked, getting their feelings hurt, lack of privacy, inappropriate pictures, bullying, negativity, and stalkers. This study informs teachers, administrators, technology facilitators and parents on social media use by students. 
    more » « less
  2. Wherever you look you are likely to see people on their phones, noses inches from the screen, browsing the internet, and especially spending time on social media. If you have used social media before, you know you can “like” posts, share them with friends, comment on them, and respond to what others have said. How do our brains remember social media? Do we remember social media posts better if we interact with them in some way? To study this, we asked people to view real Instagram posts and comment on some of them. Later, we tested their memory for these posts. We found that people were much more likely to remember the posts that they commented on. These results are important to consider when using social media. When we actively engage with social media, it is more likely to stick in memory, so we may need to choose wisely what we interact with to keep ourselves healthy. 
    more » « less
  3. News coverage of security and privacy (S&P) events is pervasive and may affect the salience of S&P threats to the public. To better understand this coverage and its effects, we asked: What types of S&P news come into people's awareness? How do people hear about and share this news? Over two years, we recruited 1999 participants to fill out a survey on emergent S&P news events. We identified four types of S&P news: financial data breaches, corporate personal data breaches, high sensitivity systems breaches, and politicized / activist cybersecurity. These event types strongly correlated with how people shared S&P news-e.g., financial data breaches were shared most (42%), while politicized / activist cybersecurity events were shared least (21%). Furthermore, participants' age, gender and security behavioral intention strongly correlated with how they heard about and shared S&P news-e.g., males more often felt a personal responsibility to share, and older people were less likely to hear about S&P news through conversation. 
    more » « less
  4. Abstract People believe they should consider how their behavior might negatively impact other people, Yet their behavior often increases others’ health risks. This creates challenges for managing public health crises like the COVID-19 pandemic. We examined a procedure wherein people reflect on their personal criteria regarding how their behavior impacts others’ health risks. We expected structured reflection to increase people's intentions and decisions to reduce others’ health risks. Structured reflection increases attention to others’ health risks and the correspondence between people's personal criteria and behavioral intentions. In four experiments during COVID-19, people (N  = 12,995) reported their personal criteria about how much specific attributes, including the impact on others’ health risks, should influence their behavior. Compared with control conditions, people who engaged in structured reflection reported greater intentions to reduce business capacity (experiment 1) and avoid large social gatherings (experiments 2 and 3). They also donated more to provide vaccines to refugees (experiment 4). These effects emerged across seven countries that varied in collectivism and COVID-19 case rates (experiments 1 and 2). Structured reflection was distinct from instructions to carefully deliberate (experiment 3). Structured reflection increased the correlation between personal criteria and behavioral intentions (experiments 1 and 3). And structured reflection increased donations more among people who scored lower in cognitive reflection compared with those who scored higher in cognitive reflection (experiment 4). These findings suggest that structured reflection can effectively increase behaviors to reduce public health risks. 
    more » « less
  5. How do people assess the likelihood of personal risk in online activity? In three pilot experiments and one preregistered experiment, we tested the motivational and cognitive mechanisms that shape self and social judgments of cyber security. In Pilot Studies 1–3, we probed for evidence of differential use of base rate information in forecasting the likelihood oneself or another person would engage in a risky behavior. In the preregistered experiment, we gathered direct evidence of differential use of base rate information through covert eye-tracking. Data suggest people self-enhance when assessing risk, believing they are less likely than others to engage in actions that pose a threat to their cyber security, particularly because they rely less on base rate information when predicting their own behavior compared to others’ behavior. Self and social judgments were not different when scenarios posed no risk. We discuss implications for self-insight and interventions to curb risky behavior in online activity. 
    more » « less