SlideShare a Scribd company logo
Components of a Model of
Cybersecurity Behavior Adoption
Cori Faklaris,
Carnegie Mellon University
Workshop on Security Information Workers
Symposium on Usable Privacy and Security
Aug. 8, 2021
August 2021
Agenda ▪ Introduction
▪ Existing models and their relevant
components
▪ Overview of my thesis research to start
defining the learning/adoption
trajectories for end-user cybersecurity
behavior
▪ Implications
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 2
About Cori (@heycori)
▪ 5th year PhD candidate and researcher at the
Human-Computer Interaction Institute, School of
Computer Science, Carnegie Mellon University.
▪ Knight Fellow of the Center for Informed Democracy and
Social Cybersecurity (IDeaS); CMU Presidential Fellow of
the CyLab Security & Privacy Institute.
▪ Co-principal investigator on the NSF Social Cybersecurity
project at the HCII (https://socialcybersecurity.org/ ).
▪ Past career in journalism, IT and social media
(https://corifaklaris.com).
▪ Published at the USENIX Symposium on Usable Privacy
and Security (SOUPS) and in Proceedings of the ACM:
Human-Computer Interaction (CSCW), other venues.
3
Problem:
Cyberdefense
(Non-) Adoption
▪ Computing systems are increasingly
central to society.
▪ But, many people do not understand
enough about how they work - or what
cyber-threats to guard against.
▪ Meanwhile, global costs of cybercrime
jumped >50% in 2019-20, to over $1T.
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 4
Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. “My Data Just Goes Everywhere:” User Mental Models of the Internet and Implications for Privacy and Security. In Symposium on Usable Privacy and Security (SOUPS), USENIX
Association Berkeley, CA, 39–52. Retrieved from https://www.usenix.org/conference/soups2015/proceedings/presentation/kang
Zhanna Malekos Smith, Eugenia Lostri, and James A Lewis. 2020. The Hidden Costs of Cybercrime. McAfee.
Problem:
Cyberdefense
(Non-) Adoption
▪ Enterprise security training can cost
around $300,000 + 100s of staff hours.
▪ Difficult to persuade users to accept and
adopt security measures when they or
their peers do not view these measures
positively.
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 5
Tara Seals. 2017. Cost of User Security Training Tops $290K Per Year. Infosecurity Magazine. Retrieved January 20, 2021 from https://www.infosecurity-magazine.com:443/news/cost-of-user-security-training/
Cori Faklaris, Laura Dabbish, and Jason I Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), USENIX Association Berkeley, CA, Santa Clara, CA, 18. Retrieved from
https://www.usenix.org/system/files/soups2019-faklaris.pdf
Sauvik Das, Adam D.I. Kramer, Laura A. Dabbish, and Jason I. Hong. 2015. The Role of Social Influence in Security Feature Adoption. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW ’15), ACM, New York, NY, USA, 1416–1426.
DOI:https://doi.org/10.1145/2675133.2675225
To reduce costs and
improve awareness
+ adoption, we should
apply insights from:
▪ social psychology,
▪ marketing, and
▪ public health.
6
Key Insight for
Cyberdefense
An empirical
understanding of the
cyberdefense adoption
process will help us to
specify the mental states
and social influences
acting at each step,
leading to better targeting
and timing of security
interventions.
7
My Thesis
8
Cori Faklaris. 2021. Components of a Model
of Cybersecurity Behavior Adoption. In
Workshop on Security Information
Workers. Retrieved from
https://corifaklaris.com/files/Faklaris_WS
IW2021_stagemodels.pdf
● Many models of behavior adoption focus on concepts
of expectancy (how likely it is thought that a desired,
instrumental outcome will occur) and value (how
much the outcome has importance or utility).
● They do not account for time or how thinking evolves.
Search string in Google Scholar using an "incognito" browser window in July 2021 Results
fogg behavior model and cybersecurity 395
decisional balance theory and cybersecurity 1210
prospect theory and cybersecurity 13700
health belief model and cybersecurity 19500
theory of reasoned action and cybersecurity 18900
theory of planned behavior and cybersecurity 25000
protection motivation theory and cybersecurity 27800
technology acceptance model and cybersecurity 31300
Focus:
Understand
Process of
Cyberdefense
(Non-) Adoption
Theoretical Modeling
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 8
Theory of Planned Behavior (TPB)
9
Protection Motivation Theory (PMT)
10
Technology Acceptance Model (TAM)
11
12
Cori Faklaris. 2021. Components of a Model
of Cybersecurity Behavior Adoption. In
Workshop on Security Information
Workers. Retrieved from
https://corifaklaris.com/files/Faklaris_WS
IW2021_stagemodels.pdf
● Stage models of behavior change account for the
progress of time, breaking the continuum into chunks.
● The Transtheoretical Model sees change as a cyclical
process, in which the associated processes of change
help move people from one stage to the next.
● The Precaution Adoption Process Model break down
“inaction” into unawareness, unengaged, undecided, and
decided not to act; “action’ stages are like TTM.
● The Diffusion of Innovations process model accounts for
more “action” stage changes such as confirmation, later
adoption, and discontinuance of adoption.
Search string in Google Scholar using an "incognito" browser window in July 2021 Results
transtheoretical model and cybersecurity 112
precaution adoption process model and cybersecurity 9610
diffusion of innovations and cybersecurity 17300
Focus:
Understand
Process of
Cyberdefense
(Non-) Adoption
Theoretical Modeling
Transtheoretical Model (TTM)
13
Experiential
processes
Behavioral processes
Diffusion of Innovations (DoI) Process Model
14
RQ: What stages do people go through in
adoption (or non-adoption) of
cybersecurity behaviors?
15
Phase 3
Method: Exploratory Sequential Mixed-Methods
16
John W. Creswell and J. David Creswell. 2017. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. SAGE Publications. Retrieved from https://play.google.com/store/books/details?id=KGNADwAAQBAJ
Surveys
Interviews Analysis Survey
Design
Analysis
Triangulation
and Integration
Phase 1 - Qualitative Phase 2 - Quantitative
Mandatory adoption
Cybersecurity has
two different
learning/
adoption
trajectories
Voluntary adoption
17
Learning
Persuasion Adoption
Learning
Threat
Authorities
Adoption
Threat
Peers/Media
Persuasion
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 17
Implications:
Specify how
the stages
might vary
for different
security
measures
For tool-based practices
such as password
managers, 2FA
authentication:
How many are aware of,
motivated, and/or able to
use each of the tools?
How much do social
influences and
voluntariness weigh in the
decision to adopt?
Why do people stop using
the tools, once adopted?
For knowledge-based
practices such as timely
updates, alertness to
“fake news”:
How many people are
aware of which practices
have merit, and when?
Which cognitions or
contexts cue them to act
out practices?
Whiat defeats their
intention to act out
practices?
18
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 18
Outcome:
Stage Model of
Cybersecurity
Behavior
Adoption
▪ Moves the field of usable security away
from “one size fits all” strategies
▪ Use to create a classification algorithm
to direct resources, “interventions”
(such as security tips or interface
nudges) to those most likely to benefit.
▪ Boost effectiveness of cybersecurity risk
assessments in resource-tight orgs
▪ Help adoption researchers to sharpen
strategies, build business value
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 19
Future work Collect experimental evidence for targeting
security interventions by stage and by tool:
▪ Password managers
▪ Software updates
Examine how this and/or other stage
models, such as Diffusion of Innovations,
can be adapted for enterprise teams
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 20
Mandatory adoption
What are your
questions /
feedback on
these ideas?
Voluntary adoption
21
Learning
Persuasion Adoption
Learning
Threat
Authorities
Adoption
Threat
Peers/Media
Persuasion
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 21

More Related Content

What's hot

LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
LifeLockBusinessSolutions
 
The future of technology
The future of technologyThe future of technology
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenI4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
Paul van Heel
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsLea Shanley
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
blogzilla
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
Dinesh O Bareja
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
axnv
 
Trusting the internet
Trusting the internetTrusting the internet
Trusting the internetAireen Sinong
 
Digital Fault-Lines
Digital Fault-LinesDigital Fault-Lines
Digital Fault-Lines
Cyril Foday-Kailie
 
Thesis proposal v3
Thesis proposal v3Thesis proposal v3
Thesis proposal v3
lroddesign
 
Raytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity SurveyRaytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity Survey
- Mark - Fullbright
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
Paul van Heel
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
LaVerne Kemp
 

What's hot (20)

LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenI4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis Informatics
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Trusting the internet
Trusting the internetTrusting the internet
Trusting the internet
 
Digital Fault-Lines
Digital Fault-LinesDigital Fault-Lines
Digital Fault-Lines
 
Thesis proposal v3
Thesis proposal v3Thesis proposal v3
Thesis proposal v3
 
Raytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity SurveyRaytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity Survey
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
 

Similar to Components of a Model of Cybersecurity Behavior Adoption

How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
University of North Carolina at Charlotte
 
Behaviour Change and Cyber-Security
Behaviour Change and Cyber-SecurityBehaviour Change and Cyber-Security
Behaviour Change and Cyber-Security
joinson
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
Kandy Woodfield
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
eckchela
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...
IJECEIAES
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-usersThomas Hughes
 
CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera readyMark Sinclair
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and Privacy
University of North Carolina at Charlotte
 
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Nicola Marae Allain, PhD
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
IOSR Journals
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
June Wall
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
Malinka Ivanova
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
University of South Africa (Unisa)
 
Getting Successful Universal Ehr Is Not Just Technology...
Getting Successful Universal Ehr Is Not Just Technology...Getting Successful Universal Ehr Is Not Just Technology...
Getting Successful Universal Ehr Is Not Just Technology...
Jessica Tanner
 
Accessible Privacy and Security
Accessible Privacy and SecurityAccessible Privacy and Security
Accessible Privacy and Security
Pavithren V S Pakianathan
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
gloriakt
 
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
Keiko Tanaka
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
David Sweigert
 

Similar to Components of a Model of Cybersecurity Behavior Adoption (20)

How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
 
Behaviour Change and Cyber-Security
Behaviour Change and Cyber-SecurityBehaviour Change and Cyber-Security
Behaviour Change and Cyber-Security
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-users
 
CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera ready
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and Privacy
 
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
Getting Successful Universal Ehr Is Not Just Technology...
Getting Successful Universal Ehr Is Not Just Technology...Getting Successful Universal Ehr Is Not Just Technology...
Getting Successful Universal Ehr Is Not Just Technology...
 
Accessible Privacy and Security
Accessible Privacy and SecurityAccessible Privacy and Security
Accessible Privacy and Security
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
 

More from University of North Carolina at Charlotte

A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteA Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
University of North Carolina at Charlotte
 
Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid Edge
University of North Carolina at Charlotte
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
University of North Carolina at Charlotte
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)
University of North Carolina at Charlotte
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'
University of North Carolina at Charlotte
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
University of North Carolina at Charlotte
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
University of North Carolina at Charlotte
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”
University of North Carolina at Charlotte
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017
University of North Carolina at Charlotte
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
University of North Carolina at Charlotte
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides
University of North Carolina at Charlotte
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanites
University of North Carolina at Charlotte
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile
University of North Carolina at Charlotte
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student
University of North Carolina at Charlotte
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement online
University of North Carolina at Charlotte
 

More from University of North Carolina at Charlotte (15)

A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteA Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
 
Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid Edge
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanites
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement online
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

Components of a Model of Cybersecurity Behavior Adoption

  • 1. Components of a Model of Cybersecurity Behavior Adoption Cori Faklaris, Carnegie Mellon University Workshop on Security Information Workers Symposium on Usable Privacy and Security Aug. 8, 2021 August 2021
  • 2. Agenda ▪ Introduction ▪ Existing models and their relevant components ▪ Overview of my thesis research to start defining the learning/adoption trajectories for end-user cybersecurity behavior ▪ Implications Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 2
  • 3. About Cori (@heycori) ▪ 5th year PhD candidate and researcher at the Human-Computer Interaction Institute, School of Computer Science, Carnegie Mellon University. ▪ Knight Fellow of the Center for Informed Democracy and Social Cybersecurity (IDeaS); CMU Presidential Fellow of the CyLab Security & Privacy Institute. ▪ Co-principal investigator on the NSF Social Cybersecurity project at the HCII (https://socialcybersecurity.org/ ). ▪ Past career in journalism, IT and social media (https://corifaklaris.com). ▪ Published at the USENIX Symposium on Usable Privacy and Security (SOUPS) and in Proceedings of the ACM: Human-Computer Interaction (CSCW), other venues. 3
  • 4. Problem: Cyberdefense (Non-) Adoption ▪ Computing systems are increasingly central to society. ▪ But, many people do not understand enough about how they work - or what cyber-threats to guard against. ▪ Meanwhile, global costs of cybercrime jumped >50% in 2019-20, to over $1T. Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 4 Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. “My Data Just Goes Everywhere:” User Mental Models of the Internet and Implications for Privacy and Security. In Symposium on Usable Privacy and Security (SOUPS), USENIX Association Berkeley, CA, 39–52. Retrieved from https://www.usenix.org/conference/soups2015/proceedings/presentation/kang Zhanna Malekos Smith, Eugenia Lostri, and James A Lewis. 2020. The Hidden Costs of Cybercrime. McAfee.
  • 5. Problem: Cyberdefense (Non-) Adoption ▪ Enterprise security training can cost around $300,000 + 100s of staff hours. ▪ Difficult to persuade users to accept and adopt security measures when they or their peers do not view these measures positively. Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 5 Tara Seals. 2017. Cost of User Security Training Tops $290K Per Year. Infosecurity Magazine. Retrieved January 20, 2021 from https://www.infosecurity-magazine.com:443/news/cost-of-user-security-training/ Cori Faklaris, Laura Dabbish, and Jason I Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), USENIX Association Berkeley, CA, Santa Clara, CA, 18. Retrieved from https://www.usenix.org/system/files/soups2019-faklaris.pdf Sauvik Das, Adam D.I. Kramer, Laura A. Dabbish, and Jason I. Hong. 2015. The Role of Social Influence in Security Feature Adoption. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW ’15), ACM, New York, NY, USA, 1416–1426. DOI:https://doi.org/10.1145/2675133.2675225
  • 6. To reduce costs and improve awareness + adoption, we should apply insights from: ▪ social psychology, ▪ marketing, and ▪ public health. 6 Key Insight for Cyberdefense
  • 7. An empirical understanding of the cyberdefense adoption process will help us to specify the mental states and social influences acting at each step, leading to better targeting and timing of security interventions. 7 My Thesis
  • 8. 8 Cori Faklaris. 2021. Components of a Model of Cybersecurity Behavior Adoption. In Workshop on Security Information Workers. Retrieved from https://corifaklaris.com/files/Faklaris_WS IW2021_stagemodels.pdf ● Many models of behavior adoption focus on concepts of expectancy (how likely it is thought that a desired, instrumental outcome will occur) and value (how much the outcome has importance or utility). ● They do not account for time or how thinking evolves. Search string in Google Scholar using an "incognito" browser window in July 2021 Results fogg behavior model and cybersecurity 395 decisional balance theory and cybersecurity 1210 prospect theory and cybersecurity 13700 health belief model and cybersecurity 19500 theory of reasoned action and cybersecurity 18900 theory of planned behavior and cybersecurity 25000 protection motivation theory and cybersecurity 27800 technology acceptance model and cybersecurity 31300 Focus: Understand Process of Cyberdefense (Non-) Adoption Theoretical Modeling Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 8
  • 9. Theory of Planned Behavior (TPB) 9
  • 12. 12 Cori Faklaris. 2021. Components of a Model of Cybersecurity Behavior Adoption. In Workshop on Security Information Workers. Retrieved from https://corifaklaris.com/files/Faklaris_WS IW2021_stagemodels.pdf ● Stage models of behavior change account for the progress of time, breaking the continuum into chunks. ● The Transtheoretical Model sees change as a cyclical process, in which the associated processes of change help move people from one stage to the next. ● The Precaution Adoption Process Model break down “inaction” into unawareness, unengaged, undecided, and decided not to act; “action’ stages are like TTM. ● The Diffusion of Innovations process model accounts for more “action” stage changes such as confirmation, later adoption, and discontinuance of adoption. Search string in Google Scholar using an "incognito" browser window in July 2021 Results transtheoretical model and cybersecurity 112 precaution adoption process model and cybersecurity 9610 diffusion of innovations and cybersecurity 17300 Focus: Understand Process of Cyberdefense (Non-) Adoption Theoretical Modeling
  • 14. Diffusion of Innovations (DoI) Process Model 14
  • 15. RQ: What stages do people go through in adoption (or non-adoption) of cybersecurity behaviors? 15
  • 16. Phase 3 Method: Exploratory Sequential Mixed-Methods 16 John W. Creswell and J. David Creswell. 2017. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. SAGE Publications. Retrieved from https://play.google.com/store/books/details?id=KGNADwAAQBAJ Surveys Interviews Analysis Survey Design Analysis Triangulation and Integration Phase 1 - Qualitative Phase 2 - Quantitative
  • 17. Mandatory adoption Cybersecurity has two different learning/ adoption trajectories Voluntary adoption 17 Learning Persuasion Adoption Learning Threat Authorities Adoption Threat Peers/Media Persuasion Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 17
  • 18. Implications: Specify how the stages might vary for different security measures For tool-based practices such as password managers, 2FA authentication: How many are aware of, motivated, and/or able to use each of the tools? How much do social influences and voluntariness weigh in the decision to adopt? Why do people stop using the tools, once adopted? For knowledge-based practices such as timely updates, alertness to “fake news”: How many people are aware of which practices have merit, and when? Which cognitions or contexts cue them to act out practices? Whiat defeats their intention to act out practices? 18 Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 18
  • 19. Outcome: Stage Model of Cybersecurity Behavior Adoption ▪ Moves the field of usable security away from “one size fits all” strategies ▪ Use to create a classification algorithm to direct resources, “interventions” (such as security tips or interface nudges) to those most likely to benefit. ▪ Boost effectiveness of cybersecurity risk assessments in resource-tight orgs ▪ Help adoption researchers to sharpen strategies, build business value Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 19
  • 20. Future work Collect experimental evidence for targeting security interventions by stage and by tool: ▪ Password managers ▪ Software updates Examine how this and/or other stage models, such as Diffusion of Innovations, can be adapted for enterprise teams Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 20
  • 21. Mandatory adoption What are your questions / feedback on these ideas? Voluntary adoption 21 Learning Persuasion Adoption Learning Threat Authorities Adoption Threat Peers/Media Persuasion Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 21