TY - GEN
T1 - Negative Effects of Social Triggers on User Security and Privacy Behaviors
AU - Moore, Lachlan
AU - Mori, Tatsuya
AU - Hasegawa, Ayako A.
N1 - Publisher Copyright:
Copyright is held by the author/owner.
PY - 2024
Y1 - 2024
N2 - People make decisions while being influenced by those around them. Previous studies have shown that users often adopt security practices on the basis of advice from others and have proposed collaborative and community-based approaches to enhance user security behaviors. In this paper, we focused on the negative effects of social triggers and investigated whether risky user behaviors are socially triggered. We conducted an online survey to understand the triggers for risky user behaviors and the practices of sharing the behaviors. We found that a non-negligible percentage of participants experienced social triggers before engaging in risky behaviors. We also show that socially triggered risky behaviors are more likely to be socially shared, i.e., there are negative chains of risky behaviors. Our findings suggest that more efforts are needed to reduce negative social effects, and we propose specific approaches to accomplish this.
AB - People make decisions while being influenced by those around them. Previous studies have shown that users often adopt security practices on the basis of advice from others and have proposed collaborative and community-based approaches to enhance user security behaviors. In this paper, we focused on the negative effects of social triggers and investigated whether risky user behaviors are socially triggered. We conducted an online survey to understand the triggers for risky user behaviors and the practices of sharing the behaviors. We found that a non-negligible percentage of participants experienced social triggers before engaging in risky behaviors. We also show that socially triggered risky behaviors are more likely to be socially shared, i.e., there are negative chains of risky behaviors. Our findings suggest that more efforts are needed to reduce negative social effects, and we propose specific approaches to accomplish this.
UR - http://www.scopus.com/inward/record.url?scp=85204890829&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85204890829&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85204890829
T3 - Proceedings of the 20th Symposium on Usable Privacy and Security, SOUPS 2024
SP - 605
EP - 622
BT - Proceedings of the 20th Symposium on Usable Privacy and Security, SOUPS 2024
PB - USENIX Association
T2 - 20th Symposium on Usable Privacy and Security, SOUPS 2024
Y2 - 12 August 2024 through 13 August 2024
ER -