skip to main content


Title: A Typology of Perceived Triggers for End-User Security and Privacy Behaviors
What triggers end-user security and privacy (S&P) behaviors? How do those triggers vary across individuals? When and how do people share their S&P behavior changes? Prior work, in usable security and persuasive design, suggests that answering these questions is critical if we are to design systems that encourage pro-S&P behaviors. Accordingly, we asked 852 online survey respondents about their most recent S&P behaviors (n = 1947), what led up to those behaviors, and if they shared those behaviors. We found that social “triggers”, where people interacted with or observed others, were most common, followed by proactive triggers, where people acted absent of an external stimulus, and lastly by forced triggers, where people were forced to act. People from different age groups, nationalities, and levels of security behavioral intention (SBI) all varied in which triggers were dominant. Most importantly, people with low-to-medium SBI most commonly reported social triggers. Furthermore, participants were four times more likely to share their behavior changes with others when they, themselves, reported a social trigger.  more » « less
Award ID(s):
1755625
NSF-PAR ID:
10160148
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
USENIX Symposium on Usable Privacy and Security (SOUPS)
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Introduction Social media has created opportunities for children to gather social support online (Blackwell et al., 2016; Gonzales, 2017; Jackson, Bailey, & Foucault Welles, 2018; Khasawneh, Rogers, Bertrand, Madathil, & Gramopadhye, 2019; Ponathil, Agnisarman, Khasawneh, Narasimha, & Madathil, 2017). However, social media also has the potential to expose children and adolescents to undesirable behaviors. Research showed that social media can be used to harass, discriminate (Fritz & Gonzales, 2018), dox (Wood, Rose, & Thompson, 2018), and socially disenfranchise children (Page, Wisniewski, Knijnenburg, & Namara, 2018). Other research proposes that social media use might be correlated to the significant increase in suicide rates and depressive symptoms among children and adolescents in the past ten years (Mitchell, Wells, Priebe, & Ybarra, 2014). Evidence based research suggests that suicidal and unwanted behaviors can be promulgated through social contagion effects, which model, normalize, and reinforce self-harming behavior (Hilton, 2017). These harmful behaviors and social contagion effects may occur more frequently through repetitive exposure and modelling via social media, especially when such content goes “viral” (Hilton, 2017). One example of viral self-harming behavior that has generated significant media attention is the Blue Whale Challenge (BWC). The hearsay about this challenge is that individuals at all ages are persuaded to participate in self-harm and eventually kill themselves (Mukhra, Baryah, Krishan, & Kanchan, 2017). Research is needed specifically concerning BWC ethical concerns, the effects the game may have on teenagers, and potential governmental interventions. To address this gap in the literature, the current study uses qualitative and content analysis research techniques to illustrate the risk of self-harm and suicide contagion through the portrayal of BWC on YouTube and Twitter Posts. The purpose of this study is to analyze the portrayal of BWC on YouTube and Twitter in order to identify the themes that are presented on YouTube and Twitter posts that share and discuss BWC. In addition, we want to explore to what extent are YouTube videos compliant with safe and effective suicide messaging guidelines proposed by the Suicide Prevention Resource Center (SPRC). Method Two social media websites were used to gather the data: 60 videos and 1,112 comments from YouTube and 150 posts from Twitter. The common themes of the YouTube videos, comments on those videos, and the Twitter posts were identified using grounded, thematic content analysis on the collected data (Padgett, 2001). Three codebooks were built, one for each type of data. The data for each site were analyzed, and the common themes were identified. A deductive coding analysis was conducted on the YouTube videos based on the nine SPRC safe and effective messaging guidelines (Suicide Prevention Resource Center, 2006). The analysis explored the number of videos that violated these guidelines and which guidelines were violated the most. The inter-rater reliabilities between the coders ranged from 0.61 – 0.81 based on Cohen’s kappa. Then the coders conducted consensus coding. Results & Findings Three common themes were identified among all the posts in the three social media platforms included in this study. The first theme included posts where social media users were trying to raise awareness and warning parents about this dangerous phenomenon in order to reduce the risk of any potential participation in BWC. This was the most common theme in the videos and posts. Additionally, the posts claimed that there are more than 100 people who have played BWC worldwide and provided detailed description of what each individual did while playing the game. These videos also described the tasks and different names of the game. Only few videos provided recommendations to teenagers who might be playing or thinking of playing the game and fewer videos mentioned that the provided statistics were not confirmed by reliable sources. The second theme included posts of people that either criticized the teenagers who participated in BWC or made fun of them for a couple of reasons: they agreed with the purpose of BWC of “cleaning the society of people with mental issues,” or they misunderstood why teenagers participate in these kind of challenges, such as thinking they mainly participate due to peer pressure or to “show off”. The last theme we identified was that most of these users tend to speak in detail about someone who already participated in BWC. These videos and posts provided information about their demographics and interviews with their parents or acquaintances, who also provide more details about the participant’s personal life. The evaluation of the videos based on the SPRC safe messaging guidelines showed that 37% of the YouTube videos met fewer than 3 of the 9 safe messaging guidelines. Around 50% of them met only 4 to 6 of the guidelines, while the remaining 13% met 7 or more of the guidelines. Discussion This study is the first to systematically investigate the quality, portrayal, and reach of BWC on social media. Based on our findings from the emerging themes and the evaluation of the SPRC safe messaging guidelines we suggest that these videos could contribute to the spread of these deadly challenges (or suicide in general since the game might be a hoax) instead of raising awareness. Our suggestion is parallel with similar studies conducted on the portrait of suicide in traditional media (Fekete & Macsai, 1990; Fekete & Schmidtke, 1995). Most posts on social media romanticized people who have died by following this challenge, and younger vulnerable teens may see the victims as role models, leading them to end their lives in the same way (Fekete & Schmidtke, 1995). The videos presented statistics about the number of suicides believed to be related to this challenge in a way that made suicide seem common (Cialdini, 2003). In addition, the videos presented extensive personal information about the people who have died by suicide while playing the BWC. These videos also provided detailed descriptions of the final task, including pictures of self-harm, material that may encourage vulnerable teens to consider ending their lives and provide them with methods on how to do so (Fekete & Macsai, 1990). On the other hand, these videos both failed to emphasize prevention by highlighting effective treatments for mental health problems and failed to encourage teenagers with mental health problems to seek help and providing information on where to find it. YouTube and Twitter are capable of influencing a large number of teenagers (Khasawneh, Ponathil, Firat Ozkan, & Chalil Madathil, 2018; Pater & Mynatt, 2017). We suggest that it is urgent to monitor social media posts related to BWC and similar self-harm challenges (e.g., the Momo Challenge). Additionally, the SPRC should properly educate social media users, particularly those with more influence (e.g., celebrities) on elements that boost negative contagion effects. While the veracity of these challenges is doubted by some, posting about the challenges in unsafe manners can contribute to contagion regardless of the challlenges’ true nature. 
    more » « less
  2. null (Ed.)
    Many of us are working to create a more inclusive and socially just culture within engineering education and engineering. Despite significant effort, marginalization and discrimination continue, buoyed by systems of oppression. How can we disrupt and dismantle oppressive systems in engineering education? In our work, we explore how power and privilege are enacted within leadership teams that aim to create revolutionary changes within engineering departments. Based on this work, we developed the POWER protocol (Privilege and Oppression: Working for Equitable Recourse), a workshop that guides engineering educators to identify and understand the intersectional nature of power and privilege before planning strategies to disrupt, disarm, and dismantle it. In this paper, we present a design case to show how this workshop has evolved. We provide the POWER protocol in the appendix so that others can adapt this workshop for their own contexts. In the interactive session at CoNECD, we will take attendees through part of the POWER protocol (we will scope the workshop to fit in the time allotted; the full workshop is 1.5 hours) to examine how power, privilege, and intersectionality can help attendees frame their experiences and begin to understand how their everyday experiences may be influenced by systemic oppression. To guide this process, we orient around the question: How can we become aware of power and privilege on collaborative academic teams in order to better affect social change and improve interdisciplinary and cross-identity/boundary interactions, communication, and inclusivity? We hope that through interactive sessions such as this that we can all become more persistent and sophisticated in our efforts to dismantle some of these forms of power and privilege within the university, especially those aspects that continue to oppress and oftentimes push marginalized people and perspectives out of academia. Our interactive approach will position attendees to bring this protocol back to their institutions and adapt it to their own contexts. In the tradition of the design case such as those published by the International Journal of Designs for Learning, we detail how our contexts and the literature informed the iterative development of the POWER protocol in this paper. We provide a vivid account of the POWER protocol and a facilitation guide that others can use and adapt in their own contexts. Using a narrative format, we share a forthright account of our development process. Design cases are valuable in highlighting distinctive aspects of how a design came to be; by sharing our design decisions along with the design, others may gain insight into both what has made our design successful, and where it may be brittle when used in new contexts. Finally, we describe how we will engage attendees in the CoNECD session. 
    more » « less
  3. Abstract Background

    Depression is one of the top mental health concerns among biology graduate students and has contributed to the “graduate student mental health crisis” declared in 2018. Several prominent science outlets have called for interventions to improve graduate student mental health, yet it is unclear to what extent graduate students with depression discuss their mental health with others in their Ph.D. programs. While sharing one’s depression may be an integral step to seeking mental health support during graduate school, depression is considered to be a concealable stigmatized identity (CSI) and revealing one’s depression could result in loss of status or discrimination. As such, face negotiation theory, which describes a set of communicative behaviors that individuals use to regulate their social dignity, may help identify what factors influence graduate students’ decisions about whether to reveal their depression in graduate school. In this study, we interviewed 50 Ph.D. students with depression enrolled across 28 life sciences graduate programs across the United States. We examined (1) to what extent graduate students revealed their depression to faculty advisors, graduate students, and undergraduates in their research lab, (2) the reasons why they revealed or concealed their depression, and (3) the consequences and benefits they perceive are associated with revealing depression. We used a hybrid approach of deductive and inductive coding to analyze our data.

    Results

    More than half (58%) of Ph.D. students revealed their depression to at least one faculty advisor, while 74% revealed to at least one graduate student. However, only 37% of graduate students revealed their depression to at least one undergraduate researcher. Graduate students’ decisions to reveal their depression to their peers were driven by positive mutual relationships, while their decisions to reveal to faculty were often based on maintaining dignity by performing preventative or corrective facework. Conversely, graduates performed supportive facework when interacting with undergraduate researchers by revealing their depression as a way to destigmatize struggling with mental health.

    Conclusions

    Life sciences graduate students most commonly revealed their depression to other graduate students, and over half reported discussing depression with their faculty advisor. However, graduate students were reluctant to share their depression with undergraduate researchers. Power dynamics between graduate students and their advisors, their peers, and their undergraduate mentees influenced the reasons they chose to reveal or conceal their depression in each situation. This study provides insights into how to create more inclusive life science graduate programs where students can feel more comfortable discussing their mental health.

     
    more » « less
  4. Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and “bring your own technology” initiatives, attention to these topics is becoming increasingly important. A total of 593 middle school students were surveyed about digital footprints and concerns about social media. The results show that 17% started using social media at age nine or younger, 40% accepted friend requests from people they do not know, and 40% reported that their parents did not monitor their social media use, which calls for the needs of cyber-security education. These middle school students reported using social media most often to connect with their friends, share pictures, and find out what others are doing. They indicated that Instagram (27%), SnapChat (25%) and YouTube (25%) were their most used social media sites. These students have concerns about social media due to inappropriate postings, getting hacked, getting their feelings hurt, lack of privacy, inappropriate pictures, bullying, negativity, and stalkers. This study informs teachers, administrators, technology facilitators and parents on social media use by students. 
    more » « less
  5. null (Ed.)
    Abstract Smartphone location sharing is a particularly sensitive type of information disclosure that has implications for users’ digital privacy and security as well as their physical safety. To understand and predict location disclosure behavior, we developed an Android app that scraped metadata from users’ phones, asked them to grant the location-sharing permission to the app, and administered a survey. We compared the effectiveness of using self-report measures commonly used in the social sciences, behavioral data collected from users’ mobile phones, and a new type of measure that we developed, representing a hybrid of self-report and behavioral data to contextualize users’ attitudes toward their past location-sharing behaviors. This new type of measure is based on a reflective learning paradigm where individuals reflect on past behavior to inform future behavior. Based on data from 380 Android smartphone users, we found that the best predictors of whether participants granted the location-sharing permission to our app were: behavioral intention to share information with apps, the “FYI” communication style, and one of our new hybrid measures asking users whether they were comfortable sharing location with apps currently installed on their smartphones. Our novel, hybrid construct of self-reflection on past behavior significantly improves predictive power and shows the importance of combining social science and computational science approaches for improving the prediction of users’ privacy behaviors. Further, when assessing the construct validity of the Behavioral Intention construct drawn from previous location-sharing research, our data showed a clear distinction between two different types of Behavioral Intention: self-reported intention to use mobile apps versus the intention to share information with these apps. This finding suggests that users desire the ability to use mobile apps without being required to share sensitive information, such as their location. These results have important implications for cybersecurity research and system design to meet users’ location-sharing privacy needs. 
    more » « less