risk%percep+on%and%the%acceptance% …cups.cs.cmu.edu/soups/2013/risk/riskws-harbach-slides.pdf ·...

11
Risk Percep+on and the Acceptance of New Security Technology Marian Harbach, Sascha Fahl, MaAhew Smith Usable Security and Privacy Lab Leibniz Universität Hannover 1

Upload: others

Post on 03-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Risk%Percep+on%and%the%Acceptance% …cups.cs.cmu.edu/soups/2013/risk/RiskWS-Harbach-slides.pdf · 2013. 7. 25. · Risk%Percep+on%and%the%Acceptance% of%New%Security%Technology%

Risk  Percep+on  and  the  Acceptance  of  New  Security  Technology  

Marian  Harbach,  Sascha  Fahl,  MaAhew  Smith  Usable  Security  and  Privacy  Lab  Leibniz  Universität  Hannover  

1  

Page 2: Risk%Percep+on%and%the%Acceptance% …cups.cs.cmu.edu/soups/2013/risk/RiskWS-Harbach-slides.pdf · 2013. 7. 25. · Risk%Percep+on%and%the%Acceptance% of%New%Security%Technology%

Risk  Communica+on  

2  

Page 3: Risk%Percep+on%and%the%Acceptance% …cups.cs.cmu.edu/soups/2013/risk/RiskWS-Harbach-slides.pdf · 2013. 7. 25. · Risk%Percep+on%and%the%Acceptance% of%New%Security%Technology%

Related  Work  

•  Risk  communica+on  – How  to  effec+vely  warn  against  a  certain  threat  

•  Risks  selected  for  the  study  par+cipants,  e.g.  – Wash  2010:  Malware,  hackers  – Blythe  et  al.  2011:  Phishing  

3  

Page 4: Risk%Percep+on%and%the%Acceptance% …cups.cs.cmu.edu/soups/2013/risk/RiskWS-Harbach-slides.pdf · 2013. 7. 25. · Risk%Percep+on%and%the%Acceptance% of%New%Security%Technology%

Previous  Work  

•  Harbach  et  al.  2013:  Acceptance  of  privacy-­‐preserving  authen+ca+on  technology  – Generally  unsafe  Internet  – Apathy  towards  security  improvements  

•  “Whether  you  use  [an  alterna0ve  mechanism]  or  con0nue  using  passwords  [...]  there  are  vulnerabili0es  everywhere.”  

4  

Page 5: Risk%Percep+on%and%the%Acceptance% …cups.cs.cmu.edu/soups/2013/risk/RiskWS-Harbach-slides.pdf · 2013. 7. 25. · Risk%Percep+on%and%the%Acceptance% of%New%Security%Technology%

The  Generally  Unsafe  Internet  

•  Security  consists  of  many  independent  parts  that  address  specific  risks  –  easily  overwhelms  a  user    

•  Users  may  not  differen+ate  between  risks  arising  because  of    –  insecure  authen+ca+on  mechanisms,  –  lax  privacy  policies,  or    – missing  transport  security.    

•  Users  may  believe  that  guessing  a  weak  password  and  breaking  RSA  are  equally  likely.    

5  

Page 6: Risk%Percep+on%and%the%Acceptance% …cups.cs.cmu.edu/soups/2013/risk/RiskWS-Harbach-slides.pdf · 2013. 7. 25. · Risk%Percep+on%and%the%Acceptance% of%New%Security%Technology%

Research  Ques+ons  

•  How  do  users  actually  perceive  risk  during  everyday  Internet  use?  – Which  risks  are  perceived  in  which  situa+ons?  

•  How  do  users  believe  to  be  able  to  protect  themselves  against  these  risks?  

•  Why  are  the  perceived  risks  not  causing  a  demand  for  improved  IT  security  measures?  

6  

Page 7: Risk%Percep+on%and%the%Acceptance% …cups.cs.cmu.edu/soups/2013/risk/RiskWS-Harbach-slides.pdf · 2013. 7. 25. · Risk%Percep+on%and%the%Acceptance% of%New%Security%Technology%

Research  Ques+ons  II  

•  Does  communica+ng  specific  risks  hamper  adop+on  of  security  mechanisms  in  general?  – Causing  the  percep+on  of  a  “generally  unsafe  Internet”?  

•  Does  tailoring  new  security  mechanisms  to  address  the  actually  perceived  risks  increase  acceptance?  

7  

Page 8: Risk%Percep+on%and%the%Acceptance% …cups.cs.cmu.edu/soups/2013/risk/RiskWS-Harbach-slides.pdf · 2013. 7. 25. · Risk%Percep+on%and%the%Acceptance% of%New%Security%Technology%

Everyday  Internet  Risks  Survey  

8  

Page 9: Risk%Percep+on%and%the%Acceptance% …cups.cs.cmu.edu/soups/2013/risk/RiskWS-Harbach-slides.pdf · 2013. 7. 25. · Risk%Percep+on%and%the%Acceptance% of%New%Security%Technology%

Preliminary  Survey  Results  (N=111)  “In  general,  what  do  you  think  is  the  greatest  risk/the  greatest  danger  that  arises  

for  you  personally  during  day  to  day  Internet  use?”  

9  

0

10

20

30

cred

it ca

rd/a

ccou

nt th

eft

hidd

en c

ost

fraud

logi

n cr

eden

tial t

heft

phis

hing

of b

anki

ng c

red.

iden

tity

thef

t

abus

e/th

eft o

fpe

rson

al d

ata

in g

ener

al

hack

ers

own

mis

take

s

loos

ing

priva

cy

mal

ware

bully

ing,

add

ictio

n

lega

l/hea

lth/s

ocia

l ris

k

coun

tGreatest General Risk

Page 10: Risk%Percep+on%and%the%Acceptance% …cups.cs.cmu.edu/soups/2013/risk/RiskWS-Harbach-slides.pdf · 2013. 7. 25. · Risk%Percep+on%and%the%Acceptance% of%New%Security%Technology%

Preliminary  Survey  Results  (N=111)  

10  

0

20

40

60

80

cred

it ca

rd/a

ccou

nt th

eft

hidd

en c

ost

fraud

logi

n cr

eden

tial t

heft

phis

hing

of b

anki

ng c

red.

iden

tity

thef

t

abus

e/th

eft o

fpe

rson

al d

ata

in g

ener

al

hack

ers

own

mis

take

s

loos

ing

priva

cy

mal

ware

bully

ing,

add

ictio

n

lega

l/hea

lth/s

ocia

l ris

k

coun

tOverall General Risk

Page 11: Risk%Percep+on%and%the%Acceptance% …cups.cs.cmu.edu/soups/2013/risk/RiskWS-Harbach-slides.pdf · 2013. 7. 25. · Risk%Percep+on%and%the%Acceptance% of%New%Security%Technology%

Conclusion  

•  Everyday  IT  security  risk  percep+on  and  its  influence  on  technology  choice  is  not  well-­‐understood  

•  Acceptance  of  new  security  technology  may  be  increased  by  addressing  perceived  risks  – What  if  users  don’t  perceive  any  relevant  risks?  

 •  Currently,  users  seem  to  be  mostly  concerned  about  malware,  loosing  their  privacy  and  hackers  

11