SlideShare a Scribd company logo
Designing
4 Security
+ Privacy
Cori Faklaris
April 15, 2020
Programming Usable
Interfaces, Spring 2020
Human-Computer Interaction Institute
About
me
@heycori
● 3rd
-year PhD researcher at Carnegie Mellon
Univ. Human-Computer Interaction Institute,
advised by Laura Dabbish and Jason I. Hong
○ M.S., Human-Computer Interaction, Indiana University
School of Informatics and Computing
● Industry career in news + design, mainly at
Indianapolis Star / IndyStar.com / Gannett
○ Engagement Producer, News Designer, Systems
Analyst, Software Trainer, Copy Editor, Reporter,
“Doer of Things No One Else Wants to Do” (IT, UX)
● Social Media Editor and Consultant
Cori Faklaris - Carnegie Mellon University - Page 2
My research at Carnegie Mellon HCII
3Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 3
Agenda for this lecture
4
● Why care about designing for usable security + privacy
● Differences between security and privacy
○ Pessimistic vs. optimistic orientation to security
○ Data privacy vs. personal privacy
● Three-pronged approach to usable security + privacy
○ Make it invisible (where possible)
○ Offer better user interfaces (affordances, mappings, mental models, etc)
○ Train users (where necessary)
● Research that makes use of this approach
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 4
��
Slides largely based on materials from Prof. Jason I. Hong - many thanks to him!
Agenda for this lecture
5
● Why care about designing for usable security + privacy
● Differences between security and privacy
○ Pessimistic vs. optimistic orientation to security
○ Data privacy vs. personal privacy
● Three-pronged approach to usable security + privacy
○ Make it invisible (where possible)
○ Offer better user interfaces (affordances, mappings, mental models, etc)
○ Train users (where necessary)
● Research that makes use of this approach
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 5
��
Slides largely based on materials from Prof. Jason I. Hong - many thanks to him!
‘Unusable’ security + privacy is all around us ...
6Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 6
What are some examples
that you can think of?
‘Unusable’ security + privacy is all around us ...
7Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 7
Taylor Lorenz. 2020.
“Zoombombing”: When
Video Conferences Go
Wrong. The New York
Times. Retrieved April
13, 2020 from
https://www.nytimes.co
m/2020/03/20/style/zoo
mbombing-zoom-trolling.
html
‘Unusable’ security + privacy is all around us ...
8Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 8
Also see
https://www.bogleheads.
org/forum/viewtopic.php
?t=278973
‘Unusable’ security + privacy is all around us ...
9Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 9
https://www.extremetech.com/extreme/262
166-hawaiis-missile-scare-driven-terrible-ui
-fcc-launches-investigation
‘Unusable’ security + privacy is all around us ...
10Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 10
https://www.extremetech.com/extreme/262
166-hawaiis-missile-scare-driven-terrible-ui
-fcc-launches-investigation
Norman’s Gulfs of Evaluation + Execution
11
● “Mismatch between our internal
goals on the one side, and, on
the other side, the expectations
and the availability of information
specifying the state of the world
(or an artifact) and how we may
change it.”
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 11
https://www.interaction-design.org/literature/book/the-glossary
-of-human-computer-interaction/gulf-of-evaluation-and-gulf-of-
execution
https://medium.com/@gazdgabr/the-gulf-of-execution-and-eva
luation-890fca716bb7
‘You are not the user’ - experts vs. nonexperts
12Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 12
Iulia Ion, Rob Reeder, and
Sunny Consolvo. 2015. “...
No one Can Hack My
Mind”: Comparing Expert
and Non-Expert Security
Practices. In Symposium
on Usable Privacy and
Security (SOUPS) 2015,
1–20. Retrieved from
https://www.usenix.org/site
s/default/files/soups15_full
_proceedings.pdf#page=34
9
What do you do to keep your
data and accounts safe?
Security actions differ for experts vs. nonexperts
13Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 13
Iulia Ion, Rob Reeder, and
Sunny Consolvo. 2015. “...
No one Can Hack My
Mind”: Comparing Expert
and Non-Expert Security
Practices. In Symposium
on Usable Privacy and
Security (SOUPS) 2015,
1–20. Retrieved from
https://www.usenix.org/site
s/default/files/soups15_full
_proceedings.pdf#page=34
9
Designers must address laws + regulations
14Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 14
IoT security + privacy tensions are multiplying
15Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 15
Consumers growing more wary about privacy
16
2015 Pew Research survey found:
● 60% of people chose not to
install an app when they
discovered how much personal
info it required
● 43% uninstalled app after
download, for the same reason
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 16
2015. Apps Permissions in the Google Play Store. Pew Research Center:
Internet, Science & Tech. Retrieved April 14, 2020 from
https://www.pewresearch.org/internet/2015/11/10/apps-permissions-in-the
-google-play-store/
‘Social’ cyberattacks rising with mobile usage
17
● Verizon data: from 2013 to 2018, the
number of cybersecurity breaches in
which attackers used “social” methods
increased from 17% to 35%.
● The involvement of human assets in
these breaches rose from 19% to 39%
over the same time period.
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 17
Results and Analysis, 2019 Verizon Data Breach Investigations Report, available at
https://enterprise.verizon.com/resources/reports/dbir/2019/results-and-analysis/
Agenda for this lecture
18
● Why care about designing for usable security + privacy
● Differences between security and privacy
○ Pessimistic vs. optimistic orientation to security
○ Data privacy vs. personal privacy
● Three-pronged approach to usable security + privacy
○ Make it invisible (where possible)
○ Offer better user interfaces (affordances, mappings, mental models, etc)
○ Train users (where necessary)
● Research that makes use of this approach
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 18
��
Security vs. Privacy - Different but intertwined
19Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 19
What do you think is the
difference between them?
Security vs. Privacy - Different but intertwined
20
● Security
○ “CIA” model:
confidentiality,
integrity,
availability -
originally, for
guarding information
○ New desired
properties emerging
(ex. safety)
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 20
https://cryptiot.de/iot/security/security-solution-iot-com-protocol/
Security vs. Privacy - Different but intertwined
21
● Security
○ Nowadays, many
people talk about
security more as a
process or in a
certain use context
(workgroups vs.
publics), that it’s not
a binary state
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 21
https://cryptiot.de/iot/security/security-solution-iot-com-protocol/
Still might
not be
secure?
Security vs. Privacy - Different but intertwined
22
● Security
○ Nowadays, many
people talk about
security more as a
process or in a
certain context
(workgroups vs.
publics), that it’s not
a binary state
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 22
https://cryptiot.de/iot/security/security-solution-iot-com-protocol/
Still might
not be
secure?
Users’ Security Attitudes
+ Recalled Security Actions
● Cori Faklaris, Laura Dabbish and Jason I.
Hong. 2019. A Self-Report Measure of
End-User Security Attitudes (SA-6). In
Proceedings of the Fifteenth Symposium
on Usable Privacy and Security (SOUPS
2019). USENIX Association, Berkeley, CA,
USA. Available at:
https://www.usenix.org/system/files/soups
2019-faklaris.pdf
Users’ Security
Behavior Intentions
● Serge Egelman and Eyal Peer. 2015.
Scaling the Security Wall: Developing a
Security Behavior Intentions Scale
(SeBIS). In Proceedings of the 33rd
Annual ACM Conference on Human
Factors in Computing Systems (CHI ’15).
Association for Computing Machinery,
New York, NY, USA, 2873–2882. DOI:
https://doi.org/10.1145/2702123.2702249
Security vs. Privacy - Different but intertwined
23
● Privacy
○ Security necessary but not sufficient for privacy
○ Generally, appropriate use of sensitive data (&
same data could also be used inappropriately,
which makes this tricky!)
■ Personal privacy: Perception, how users feel,
manage their data and devices
■ Data privacy: How orgs handle personal data
○ Subjectively defined, difficult to measure
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 23
https://support.apple.com/
en-us/HT208650
Security vs. Privacy - Different but intertwined
24
● Privacy
○ Security necessary but not sufficient for privacy
○ Generally, appropriate use of sensitive data (&
same data could also be used inappropriately,
which makes this tricky!)
■ Personal privacy: Perception, how users feel,
manage
■ Data privacy: How orgs handle personal data
○ Subjectively defined, difficult to measure
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 24
https://support.apple.com/
en-us/HT208650
Very Short Primer for Conceptualizing Tech + Privacy
● Brandeis’ “right to be left alone” from time of photography’s introduction, established US
privacy standard (https://en.wikipedia.org/wiki/The_Right_to_Privacy_(article) )
● Altman’s Privacy Regulation Theory articulates five dimensions, such as desired vs. actual
privacy, bi-directional nature (https://en.wikipedia.org/wiki/Privacy_regulation_theory )
● Altman’s work is adapted for HCI in Leysia Palen and Paul Dourish. 2003. Unpacking
“privacy” for a networked world. In Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems (CHI ’03), 129–136. https://doi.org/10.1145/642611.642635
Threat modeling is important in security design
25
● What are you trying to protect?
● How important is it to you?
● How much are you willing to spend
to protect it?
● Who are you concerned about?
○ Honest but curious, prankers,
ex-partners, ex-coworkers, script
kiddies, cybercriminals, insider
attack, nation state
● How will they attack you?
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 25
https://www.microsoft.com/en-us/securityengineering/
sdl/threatmodeling
Threat modeling is important in security design
26
● What are you trying to protect?
● How important is it to you?
● How much are you willing to spend
to protect it?
● Who are you concerned about?
○ Honest but curious, prankers,
ex-partners, ex-coworkers, script
kiddies, cybercriminals, insider
attack, nation state
● How will they attack you?
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 26
https://www.microsoft.com/en-us/securityengineering/
sdl/threatmodeling
Threat modeling is important in security design
27
● What are you trying to protect?
● How important is it to you?
● How much are you willing to spend
to protect it?
● Who are you concerned about?
○ Honest but curious, prankers,
ex-partners, ex-coworkers, script
kiddies, cybercriminals, insider
attack, nation state
● How will they attack you?
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 27
https://www.microsoft.com/en-us/securityengineering/
sdl/threatmodeling
Security practices - Experts vs. nonexperts
28Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 28
Threat model will help determine your approach
29
● Prevent problems from
happening
○ Ex. Access control, firewalls,
IP blocking, blacklists
○ Ex. Better programming tools,
better OS
○ Ex. Require strong passwords
or 2FA, user training
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 29
● Detect + respond to problems
after the fact
○ Ex. Intrusion detection
systems (machine learning)
○ Ex. Takedown of malicious
posts, call the FBI
○ Ex. Notifying users of logins
on new devices
PESSIMISTIC OPTIMISTIC
Tradeoff - ‘wall out’ harm vs. ‘open door’ policy
30
● Choose prevention when
possible if needs high enough
○ Ex. CMU payroll system
● Can be hard to figure out all cases
beforehand
● (-) Cost can be high to make
sure you got it right
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 30
● Choose when access is
paramount & you trust people
○ Ex. Hospitals need access to
supplies, assume wise usage
● Cost to fix problems is cheap
○ Ex. Wikipedia revert
○ (-) User frustration/trauma
● Configuration costs can be lower
PESSIMISTIC OPTIMISTIC
Security practices - Experts vs. nonexperts
31Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 31
Data privacy is different than personal privacy
32
● Primarily about how orgs
collect, use, and protect
sensitive data, beyond a
single product or service
● Focuses on Personally
Identifiable Information (PII)
○ Ex. Name, address,
unique IDs, pictures
● Rules about data use,
privacy notices
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 32
https://www.trulioo.com/blog/managing-personally-identifiable-information/
Data privacy is different than personal privacy
33
● Even more procedurally
oriented than personal
privacy
○ Did you follow this
set of rules?
○ Did you check off all
of the boxes?
● Contrast to outcome-
oriented, hard to measure
too (Better? Worse?)
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 33
https://www.trulioo.com/blog/managing-personally-identifiable-information/
Fair Information Practices (FIPs) - FTC version
34
1. Notice /
Awareness
2. Choice / Consent
3. Access /
Participation
4. Integrity / Security
5. Enforcement /
Redress
https://en.wikipedia.org/wiki/FTC_fair_
information_practice#cite_note-FIPNot
ice-10
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 34
Fair Information Practices (FIPs), continued
35
● Many laws embody the Fair
Information Practices
○ GDPR, CCPA, HIPAA, Financial
Privacy Act, COPPA, FERPA
● But, enforcement is a weakness
here
○ If an org violates, can be hard to
detect
○ In practice, limited resources for
enforcement
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 35
IoT security + privacy tensions multiplying …
36Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 36
Keyword Team. 2020. Apple and
Google partner on COVID-19
contact tracing technology. Google.
Retrieved April 14, 2020 from
https://blog.google/inside-google/co
mpany-announcements/apple-and-
google-partner-covid-19-contact-tra
cing-technology/
37
Agenda for this lecture
38
● Why care about designing for usable security + privacy
● Differences between security and privacy
○ Pessimistic vs. optimistic orientation to security
○ Data privacy vs. personal privacy
● Three-pronged approach to usable security + privacy
○ Make it invisible (where possible)
○ Offer better user interfaces (affordances, mappings, mental models, etc)
○ Train users (where necessary)
● Research that makes use of this approach
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 38
��
3-prong approach to usable security + privacy
39Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 39
1. Make it invisible (where
possible)
2. Offer better user
interfaces (affordances,
mappings, mental models,
etc)
3. Train users (where
necessary)
https://www.yo
utube.com/wat
ch?v=p03TIGq
Ec8o
3-prong approach to usable security + privacy
40Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 40
1. Make it invisible (where
possible)
2. Offer better user
interfaces (affordances,
mappings, mental models,
etc)
3. Train users (where
necessary)
My
Work
Good ‘invisible’ security means user is weak pt
41Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 41
Security focus shifts to UX solutions and training
42Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 42
User education is a challenge (pessimistic view)
43
● Users are not motivated to learn about security
● Security is a secondary task
● Difficult to teach people to make right online trust decision without increasing
false positives
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 43
“User education is a complete waste of time. It is about as
much use as nailing jelly to a wall…. They are not
interested…they just want to do their job.”
Martin Overton, IBM security specialist
http://news.cnet.com/21007350_361252132.html
User education is a challenge in this work
44
● Users are not motivated to learn about security
● Security is a secondary task
● Difficult to teach people to make right online trust decision without increasing
false positives
● “User education is a complete waste of time. It is about as much use as
nailing jelly to a wall…. They are not interested…they just want to do
their job.” - Martin Overton, IBM security specialist
http://news.cnet.com/21007350_361252132.html
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 44
Actually, users ARE trainable (optimistic view)
45
● Users want to keep themselves - and those they care
about - safe
● Users can learn to protect themselves from phishing…
if you can get them to pay attention to training
○ Create “teachable moments”
○ Make training fun
○ Use learning science principles
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 45
Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, and Jason Hong. 2010. Teaching Johnny not to fall
for phish. ACM Trans. Internet Technol. 10, 2, Article 7 (June 2010), 31 pages. DOI: https://doi.org/10.1145/1754393.1754396
Nova
Cybersecurity
Lab and Game
46Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 46
https://www.pbs.org/wgbh/nova/labs/l
ab/cyber/
Great example of creating
“teachable moments” and
also injecting light-hearted
humor and design with the
simple game mechanics and
lessons.
Apps vs.
Hackers
(Ongoing
research)
47Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 47
https://apps-vs-hacker
s.firebaseapp.com/cla
ssic
Adapting “Plants
vs. Zombies”
game to a
cybersecurity
context
Hacked
Time
(Ongoing
research)
48Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 48
http://www.tianyingch
en.com/hackedtime/
Choose Your
Own Adventure,
based in Self
Efficacy Theory,
narrative
immersion
These make use of principles to boost learning
49
● Learning by doing – like our labs, get hands on practice
● Immediate feedback – better quickly than later
● Conceptual-procedural – Interleave abstract principles with concrete
examples (like we’re doing right now!) Help people understand the principle,
and offer examples to help people understand specifics, then back to
principle to generalize
● Reflection – thinking about why you did something helps with retention
(which is why we have this for homeworks)
● Multimedia – images, text, sound
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 49
User studies help evaluate learning outcomes
50
● Evaluation of PhishGuru system - is embedded training effective?
○ Study 1: Lab study, 30 participants
○ Study 2: Lab study, 42 participants
○ Study 3: Field trial at company, ~300 participants
○ Study 4: Field trial at CMU, ~500 participants
● Studies showed statistically significant decrease in falling for phish, increased
ability to retain what they learned
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 50
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge. 2007. Protecting
people from phishing: the design and evaluation of an embedded training email system. In Proceedings of the SIGCHI Conference on
Human Factors in Computing Systems (CHI ’07). Association for Computing Machinery, New York, NY, USA, 905–914.
DOI:https://doi.org/10.1145/1240624.1240760
Good interfaces for security + privacy are hard!
51
● Lots of security terminology
○ Ex. You have digital keys to “encrypt” things
○ Ex. You can also use digital keys to sign things
● Lots of complexity
○ Ex. Might have multiple sharing policies
○ Ex. Some tasks might need to be harder to prevent attacks (account
creation)
● Security is a secondary task
○ Ex. You don’t go to Dropbox to do security
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51
52
53
Sauvik Das, Gierad Laput, Chris Harrison, and Jason
I. Hong. 2017. Thumprint: Socially-Inclusive Local
Group Authentication Through Shared Secret Knocks.
In Proceedings of the 2017 CHI Conference on
Human Factors in Computing Systems (CHI ’17).
Association for Computing Machinery, New York, NY,
USA, 3764–3774. DOI:
https://doi.org/10.1145/3025453.3025991
Communication-Human
Information Processing Model
54
● See the warning?
● Understand?
● Believe it?
● Motivated?
● Can and will act?
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 54
Serge Egelman, Lorrie Faith Cranor, and Jason Hong. 2008. You’ve been warned: an
empirical study of the effectiveness of web browser phishing warnings. In
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,
1065–1074. https://doi.org/10.1145/1357054.1357219
Make a
recommendation,
but leave it to
the user to act
Agenda for this lecture
55
● Why care about designing for usable security + privacy
● Differences between security and privacy
○ Pessimistic vs. optimistic orientation to security
○ Data privacy vs. personal privacy
● Three-pronged approach to usable security + privacy
○ Make it invisible (where possible)
○ Offer better user interfaces (affordances, mappings, mental models, etc)
○ Train users (where necessary)
● Research that makes use of this approach
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 55
��
Communication-Human
Information Processing Model
56
● See the warning?
● Understand?
● Believe it?
● Motivated?
● Can and will act?
Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 56
Serge Egelman, Lorrie Faith Cranor, and Jason Hong. 2008. You’ve been warned: an
empirical study of the effectiveness of web browser phishing warnings. In
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,
1065–1074. https://doi.org/10.1145/1357054.1357219
SA-6 Measures a User’s Security Attitude
57Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 57
Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium
on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf
On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following:
● Generally, I diligently follow a routine about security practices.
● I always pay attention to experts’ advice about the steps I need to take to keep my online data
and accounts safe.
● I am extremely knowledgeable about all the steps needed to keep my online data and accounts
safe.
● I am extremely motivated to take all the steps needed to keep my online data and accounts
safe.
● I often am interested in articles about security threats.
● I seek out opportunities to learn about security measures that are relevant to me.
SA-6 Measures a User’s Security Attitude
58Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51
Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium
on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf
On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following:
● Generally, I diligently follow a routine about security practices.
● I always pay attention to experts’ advice about the steps I need to take to keep my online data
and accounts safe.
● I am extremely knowledgeable about all the steps needed to keep my online data and accounts
safe.
● I am extremely motivated to take all the steps needed to keep my online data and accounts
safe.
● I often am interested in articles about security threats.
● I seek out opportunities to learn about security measures that are relevant to me.
TAKE THE QUIZ AT
http://bit.ly/sa6quiz
SA-6 Measures a User’s Security Attitude
59Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51
Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium
on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf
On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following:
● Generally, I diligently follow a routine about security practices.
● I always pay attention to experts’ advice about the steps I need to take to keep my online data
and accounts safe.
● I am extremely knowledgeable about all the steps needed to keep my online data and accounts
safe.
● I am extremely motivated to take all the steps needed to keep my online data and accounts
safe.
● I often am interested in articles about security threats.
● I seek out opportunities to learn about security measures that are relevant to me.
SEE RESPONSES AT
http://bit.ly/sa6charts
How to Use the SA-6 Psychometric Scale
60Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51
Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium
on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf
Answer practical research questions such as:
● How attentive to security advice is a certain user group likely to be?
● Does a new awareness campaign or usability tool help or hurt a user’s
attitude toward security compliance?
Conduct theory-motivated research on human factors:
● Measure attitude in Elaboration Likelihood Model
● Measure motivation in Self-Determination Theory
● Measure coping appraisal in Protection Motivation Theory
Social Contexts of Security Behavior
61Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51
Yunpeng Song, Cori Faklaris, Zhongmin Cai, Jason I. Hong, and Laura Dabbish. 2019. Normal and Easy: Account Sharing
Practices in the Workplace. In Proceedings of the ACM: Human-Computer Interaction, Vol. 3, Issue CSCW, November 2019.
ACM, New York, NY, USA. Available at: https://drive.google.com/file/d/17xb07vuKjPrgoKNzBSGouTgqNNEeACF0/view
Workplace cybersecurity: Sharing accounts and
devices to collaborate on tasks and to keep costs down.
● Workarounds are norm (ex: password taped to PC)
● Difficult to share and to control access with systems
that presume one user at a time
● Lack of accountability and awareness of one
person’s activities by others
Social Contexts of Security Behavior
62Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51
Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish and Jason I. Hong. 2018. Share and Share Alike?
An Exploration of Secure Behaviors in Romantic Relationships. In Proceedings of the Fourteenth Symposium on Usable
Privacy and Security (SOUPS 2018). USENIX Association, Berkeley, CA, USA. Available at:
https://www.usenix.org/system/files/conference/soups2018/soups2018-park.pdf
Romantic cybersecurity: Sharing accounts and
devices as relationships and households form and while
working through the end of a relationship.
● Account sharing is both functional and emotional
● Usability challenges for romantic couples that share
accounts and devices (such as 2FA tied to only one
person’s device, breakups lead to data breaches)
63Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51
Safesea browser plugin for
Google Chrome
● Helps Facebook users navigate
privacy and security settings.
● Displays crowd and expert
suggestions for settings.
Social Contexts of
Security Behavior
Social Contexts of Security Behavior
64Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51
‘Fitness’ Tracking for cybersecurity: Could be used for contests or for sharing
and displaying behavior changes, just like with physical fitness tracking
Key
takeaways
for design
● Threat modeling - pay attention to “who”
○ Prevent Problems vs. Detect + Respond
○ Personal privacy vs. data privacy
● Fair Information Practices
● 3-pronged approach to usable security +
privacy
○ Make it invisible, Better UIs, Train
● Learning science principles
● C-HIP model for warnings
○ Also useful for non-security warnings too!
Cori Faklaris - Carnegie Mellon University - Page 65
Key
takeaways
for YOU
● Use a password manager & install all legit
software updates
● Sense of urgency is probably fake
● You’re not too smart to get fooled
● DON’T CLICK ANYTHING (google)
● Choose not easily guessable security
questions
● No free lunch
Cori Faklaris - Carnegie Mellon University - Page 66
67
67
https://socialcybersecurity.org

More Related Content

What's hot

Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
gloriakt
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Bloxx
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson
 
Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project
DIPRC2019
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
mmavis
 
Module 16 Manipulative Information and Media
Module 16 Manipulative Information and MediaModule 16 Manipulative Information and Media
Module 16 Manipulative Information and Media
johntk01
 
Day 5 social justice and multiculturalism
Day 5 social justice and multiculturalismDay 5 social justice and multiculturalism
Day 5 social justice and multiculturalismvpriddle
 
Digital Citizenship Conversations
Digital Citizenship ConversationsDigital Citizenship Conversations
Digital Citizenship Conversations
Darren Kuropatwa
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks
 
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
KKess
 
Future opportunities in social communications
Future opportunities in social communicationsFuture opportunities in social communications
Future opportunities in social communications
Pawan Gupta
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lea Rodriguez
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
gloriakt
 
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of Code
Mark Underwood
 
Adapting Your Website to a Mobile World
Adapting Your Website to a Mobile WorldAdapting Your Website to a Mobile World
Adapting Your Website to a Mobile World
Tom Jelen
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
Natalie Alesi
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
monchai sopitka
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
Dinesh O Bareja
 

What's hot (20)

Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Module 16 Manipulative Information and Media
Module 16 Manipulative Information and MediaModule 16 Manipulative Information and Media
Module 16 Manipulative Information and Media
 
Day 5 social justice and multiculturalism
Day 5 social justice and multiculturalismDay 5 social justice and multiculturalism
Day 5 social justice and multiculturalism
 
Digital Citizenship Conversations
Digital Citizenship ConversationsDigital Citizenship Conversations
Digital Citizenship Conversations
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
 
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
 
Future opportunities in social communications
Future opportunities in social communicationsFuture opportunities in social communications
Future opportunities in social communications
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of Code
 
Adapting Your Website to a Mobile World
Adapting Your Website to a Mobile WorldAdapting Your Website to a Mobile World
Adapting Your Website to a Mobile World
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 

Similar to Designing for Usable Security and Privacy

Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
University of North Carolina at Charlotte
 
Vandegrift and Rainey "Playing Data Tracking and the Attention Economy: An Im...
Vandegrift and Rainey "Playing Data Tracking and the Attention Economy: An Im...Vandegrift and Rainey "Playing Data Tracking and the Attention Economy: An Im...
Vandegrift and Rainey "Playing Data Tracking and the Attention Economy: An Im...
National Information Standards Organization (NISO)
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
University of North Carolina at Charlotte
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
write31
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
write12
 
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
University of North Carolina at Charlotte
 
Accessible Privacy and Security
Accessible Privacy and SecurityAccessible Privacy and Security
Accessible Privacy and Security
Pavithren V S Pakianathan
 
The virtuality of privacy and security on the
The virtuality of privacy and security on theThe virtuality of privacy and security on the
The virtuality of privacy and security on the
Plamen Miltenoff
 
Talks submitted
Talks submittedTalks submitted
Talks submittedKim Minh
 
Learning Informatics: AI • Analytics • Accountability • Agency
Learning Informatics: AI • Analytics • Accountability • AgencyLearning Informatics: AI • Analytics • Accountability • Agency
Learning Informatics: AI • Analytics • Accountability • Agency
Simon Buckingham Shum
 
Conference Presenation Cyber security and big data , Prof. Lili Saghafi
Conference Presenation Cyber security and big data , Prof. Lili SaghafiConference Presenation Cyber security and big data , Prof. Lili Saghafi
Conference Presenation Cyber security and big data , Prof. Lili Saghafi
Professor Lili Saghafi
 
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
Keiko Tanaka
 
2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».
2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».
2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».
eMadrid network
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
e-SIDES.eu
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docx
cockekeshia
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak data
Mary Aviles
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
ijsptm
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
mataharitimoer MT
 

Similar to Designing for Usable Security and Privacy (20)

Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Vandegrift and Rainey "Playing Data Tracking and the Attention Economy: An Im...
Vandegrift and Rainey "Playing Data Tracking and the Attention Economy: An Im...Vandegrift and Rainey "Playing Data Tracking and the Attention Economy: An Im...
Vandegrift and Rainey "Playing Data Tracking and the Attention Economy: An Im...
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
 
Accessible Privacy and Security
Accessible Privacy and SecurityAccessible Privacy and Security
Accessible Privacy and Security
 
The virtuality of privacy and security on the
The virtuality of privacy and security on theThe virtuality of privacy and security on the
The virtuality of privacy and security on the
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
 
Learning Informatics: AI • Analytics • Accountability • Agency
Learning Informatics: AI • Analytics • Accountability • AgencyLearning Informatics: AI • Analytics • Accountability • Agency
Learning Informatics: AI • Analytics • Accountability • Agency
 
Conference Presenation Cyber security and big data , Prof. Lili Saghafi
Conference Presenation Cyber security and big data , Prof. Lili SaghafiConference Presenation Cyber security and big data , Prof. Lili Saghafi
Conference Presenation Cyber security and big data , Prof. Lili Saghafi
 
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
 
2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».
2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».
2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docx
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak data
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
 

More from University of North Carolina at Charlotte

A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteA Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
University of North Carolina at Charlotte
 
Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid Edge
University of North Carolina at Charlotte
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
University of North Carolina at Charlotte
 
Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social Influences
University of North Carolina at Charlotte
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)
University of North Carolina at Charlotte
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'
University of North Carolina at Charlotte
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
University of North Carolina at Charlotte
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”
University of North Carolina at Charlotte
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017
University of North Carolina at Charlotte
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
University of North Carolina at Charlotte
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides
University of North Carolina at Charlotte
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanites
University of North Carolina at Charlotte
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile
University of North Carolina at Charlotte
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student
University of North Carolina at Charlotte
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement online
University of North Carolina at Charlotte
 

More from University of North Carolina at Charlotte (15)

A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteA Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
 
Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid Edge
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
 
Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social Influences
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanites
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement online
 

Recently uploaded

Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
abdulrafaychaudhry
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 

Recently uploaded (20)

Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 

Designing for Usable Security and Privacy

  • 1. Designing 4 Security + Privacy Cori Faklaris April 15, 2020 Programming Usable Interfaces, Spring 2020 Human-Computer Interaction Institute
  • 2. About me @heycori ● 3rd -year PhD researcher at Carnegie Mellon Univ. Human-Computer Interaction Institute, advised by Laura Dabbish and Jason I. Hong ○ M.S., Human-Computer Interaction, Indiana University School of Informatics and Computing ● Industry career in news + design, mainly at Indianapolis Star / IndyStar.com / Gannett ○ Engagement Producer, News Designer, Systems Analyst, Software Trainer, Copy Editor, Reporter, “Doer of Things No One Else Wants to Do” (IT, UX) ● Social Media Editor and Consultant Cori Faklaris - Carnegie Mellon University - Page 2
  • 3. My research at Carnegie Mellon HCII 3Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 3
  • 4. Agenda for this lecture 4 ● Why care about designing for usable security + privacy ● Differences between security and privacy ○ Pessimistic vs. optimistic orientation to security ○ Data privacy vs. personal privacy ● Three-pronged approach to usable security + privacy ○ Make it invisible (where possible) ○ Offer better user interfaces (affordances, mappings, mental models, etc) ○ Train users (where necessary) ● Research that makes use of this approach Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 4 �� Slides largely based on materials from Prof. Jason I. Hong - many thanks to him!
  • 5. Agenda for this lecture 5 ● Why care about designing for usable security + privacy ● Differences between security and privacy ○ Pessimistic vs. optimistic orientation to security ○ Data privacy vs. personal privacy ● Three-pronged approach to usable security + privacy ○ Make it invisible (where possible) ○ Offer better user interfaces (affordances, mappings, mental models, etc) ○ Train users (where necessary) ● Research that makes use of this approach Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 5 �� Slides largely based on materials from Prof. Jason I. Hong - many thanks to him!
  • 6. ‘Unusable’ security + privacy is all around us ... 6Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 6 What are some examples that you can think of?
  • 7. ‘Unusable’ security + privacy is all around us ... 7Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 7 Taylor Lorenz. 2020. “Zoombombing”: When Video Conferences Go Wrong. The New York Times. Retrieved April 13, 2020 from https://www.nytimes.co m/2020/03/20/style/zoo mbombing-zoom-trolling. html
  • 8. ‘Unusable’ security + privacy is all around us ... 8Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 8 Also see https://www.bogleheads. org/forum/viewtopic.php ?t=278973
  • 9. ‘Unusable’ security + privacy is all around us ... 9Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 9 https://www.extremetech.com/extreme/262 166-hawaiis-missile-scare-driven-terrible-ui -fcc-launches-investigation
  • 10. ‘Unusable’ security + privacy is all around us ... 10Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 10 https://www.extremetech.com/extreme/262 166-hawaiis-missile-scare-driven-terrible-ui -fcc-launches-investigation
  • 11. Norman’s Gulfs of Evaluation + Execution 11 ● “Mismatch between our internal goals on the one side, and, on the other side, the expectations and the availability of information specifying the state of the world (or an artifact) and how we may change it.” Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 11 https://www.interaction-design.org/literature/book/the-glossary -of-human-computer-interaction/gulf-of-evaluation-and-gulf-of- execution https://medium.com/@gazdgabr/the-gulf-of-execution-and-eva luation-890fca716bb7
  • 12. ‘You are not the user’ - experts vs. nonexperts 12Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 12 Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. “... No one Can Hack My Mind”: Comparing Expert and Non-Expert Security Practices. In Symposium on Usable Privacy and Security (SOUPS) 2015, 1–20. Retrieved from https://www.usenix.org/site s/default/files/soups15_full _proceedings.pdf#page=34 9 What do you do to keep your data and accounts safe?
  • 13. Security actions differ for experts vs. nonexperts 13Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 13 Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. “... No one Can Hack My Mind”: Comparing Expert and Non-Expert Security Practices. In Symposium on Usable Privacy and Security (SOUPS) 2015, 1–20. Retrieved from https://www.usenix.org/site s/default/files/soups15_full _proceedings.pdf#page=34 9
  • 14. Designers must address laws + regulations 14Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 14
  • 15. IoT security + privacy tensions are multiplying 15Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 15
  • 16. Consumers growing more wary about privacy 16 2015 Pew Research survey found: ● 60% of people chose not to install an app when they discovered how much personal info it required ● 43% uninstalled app after download, for the same reason Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 16 2015. Apps Permissions in the Google Play Store. Pew Research Center: Internet, Science & Tech. Retrieved April 14, 2020 from https://www.pewresearch.org/internet/2015/11/10/apps-permissions-in-the -google-play-store/
  • 17. ‘Social’ cyberattacks rising with mobile usage 17 ● Verizon data: from 2013 to 2018, the number of cybersecurity breaches in which attackers used “social” methods increased from 17% to 35%. ● The involvement of human assets in these breaches rose from 19% to 39% over the same time period. Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 17 Results and Analysis, 2019 Verizon Data Breach Investigations Report, available at https://enterprise.verizon.com/resources/reports/dbir/2019/results-and-analysis/
  • 18. Agenda for this lecture 18 ● Why care about designing for usable security + privacy ● Differences between security and privacy ○ Pessimistic vs. optimistic orientation to security ○ Data privacy vs. personal privacy ● Three-pronged approach to usable security + privacy ○ Make it invisible (where possible) ○ Offer better user interfaces (affordances, mappings, mental models, etc) ○ Train users (where necessary) ● Research that makes use of this approach Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 18 ��
  • 19. Security vs. Privacy - Different but intertwined 19Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 19 What do you think is the difference between them?
  • 20. Security vs. Privacy - Different but intertwined 20 ● Security ○ “CIA” model: confidentiality, integrity, availability - originally, for guarding information ○ New desired properties emerging (ex. safety) Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 20 https://cryptiot.de/iot/security/security-solution-iot-com-protocol/
  • 21. Security vs. Privacy - Different but intertwined 21 ● Security ○ Nowadays, many people talk about security more as a process or in a certain use context (workgroups vs. publics), that it’s not a binary state Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 21 https://cryptiot.de/iot/security/security-solution-iot-com-protocol/ Still might not be secure?
  • 22. Security vs. Privacy - Different but intertwined 22 ● Security ○ Nowadays, many people talk about security more as a process or in a certain context (workgroups vs. publics), that it’s not a binary state Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 22 https://cryptiot.de/iot/security/security-solution-iot-com-protocol/ Still might not be secure? Users’ Security Attitudes + Recalled Security Actions ● Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups 2019-faklaris.pdf Users’ Security Behavior Intentions ● Serge Egelman and Eyal Peer. 2015. Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI ’15). Association for Computing Machinery, New York, NY, USA, 2873–2882. DOI: https://doi.org/10.1145/2702123.2702249
  • 23. Security vs. Privacy - Different but intertwined 23 ● Privacy ○ Security necessary but not sufficient for privacy ○ Generally, appropriate use of sensitive data (& same data could also be used inappropriately, which makes this tricky!) ■ Personal privacy: Perception, how users feel, manage their data and devices ■ Data privacy: How orgs handle personal data ○ Subjectively defined, difficult to measure Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 23 https://support.apple.com/ en-us/HT208650
  • 24. Security vs. Privacy - Different but intertwined 24 ● Privacy ○ Security necessary but not sufficient for privacy ○ Generally, appropriate use of sensitive data (& same data could also be used inappropriately, which makes this tricky!) ■ Personal privacy: Perception, how users feel, manage ■ Data privacy: How orgs handle personal data ○ Subjectively defined, difficult to measure Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 24 https://support.apple.com/ en-us/HT208650 Very Short Primer for Conceptualizing Tech + Privacy ● Brandeis’ “right to be left alone” from time of photography’s introduction, established US privacy standard (https://en.wikipedia.org/wiki/The_Right_to_Privacy_(article) ) ● Altman’s Privacy Regulation Theory articulates five dimensions, such as desired vs. actual privacy, bi-directional nature (https://en.wikipedia.org/wiki/Privacy_regulation_theory ) ● Altman’s work is adapted for HCI in Leysia Palen and Paul Dourish. 2003. Unpacking “privacy” for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’03), 129–136. https://doi.org/10.1145/642611.642635
  • 25. Threat modeling is important in security design 25 ● What are you trying to protect? ● How important is it to you? ● How much are you willing to spend to protect it? ● Who are you concerned about? ○ Honest but curious, prankers, ex-partners, ex-coworkers, script kiddies, cybercriminals, insider attack, nation state ● How will they attack you? Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 25 https://www.microsoft.com/en-us/securityengineering/ sdl/threatmodeling
  • 26. Threat modeling is important in security design 26 ● What are you trying to protect? ● How important is it to you? ● How much are you willing to spend to protect it? ● Who are you concerned about? ○ Honest but curious, prankers, ex-partners, ex-coworkers, script kiddies, cybercriminals, insider attack, nation state ● How will they attack you? Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 26 https://www.microsoft.com/en-us/securityengineering/ sdl/threatmodeling
  • 27. Threat modeling is important in security design 27 ● What are you trying to protect? ● How important is it to you? ● How much are you willing to spend to protect it? ● Who are you concerned about? ○ Honest but curious, prankers, ex-partners, ex-coworkers, script kiddies, cybercriminals, insider attack, nation state ● How will they attack you? Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 27 https://www.microsoft.com/en-us/securityengineering/ sdl/threatmodeling
  • 28. Security practices - Experts vs. nonexperts 28Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 28
  • 29. Threat model will help determine your approach 29 ● Prevent problems from happening ○ Ex. Access control, firewalls, IP blocking, blacklists ○ Ex. Better programming tools, better OS ○ Ex. Require strong passwords or 2FA, user training Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 29 ● Detect + respond to problems after the fact ○ Ex. Intrusion detection systems (machine learning) ○ Ex. Takedown of malicious posts, call the FBI ○ Ex. Notifying users of logins on new devices PESSIMISTIC OPTIMISTIC
  • 30. Tradeoff - ‘wall out’ harm vs. ‘open door’ policy 30 ● Choose prevention when possible if needs high enough ○ Ex. CMU payroll system ● Can be hard to figure out all cases beforehand ● (-) Cost can be high to make sure you got it right Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 30 ● Choose when access is paramount & you trust people ○ Ex. Hospitals need access to supplies, assume wise usage ● Cost to fix problems is cheap ○ Ex. Wikipedia revert ○ (-) User frustration/trauma ● Configuration costs can be lower PESSIMISTIC OPTIMISTIC
  • 31. Security practices - Experts vs. nonexperts 31Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 31
  • 32. Data privacy is different than personal privacy 32 ● Primarily about how orgs collect, use, and protect sensitive data, beyond a single product or service ● Focuses on Personally Identifiable Information (PII) ○ Ex. Name, address, unique IDs, pictures ● Rules about data use, privacy notices Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 32 https://www.trulioo.com/blog/managing-personally-identifiable-information/
  • 33. Data privacy is different than personal privacy 33 ● Even more procedurally oriented than personal privacy ○ Did you follow this set of rules? ○ Did you check off all of the boxes? ● Contrast to outcome- oriented, hard to measure too (Better? Worse?) Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 33 https://www.trulioo.com/blog/managing-personally-identifiable-information/
  • 34. Fair Information Practices (FIPs) - FTC version 34 1. Notice / Awareness 2. Choice / Consent 3. Access / Participation 4. Integrity / Security 5. Enforcement / Redress https://en.wikipedia.org/wiki/FTC_fair_ information_practice#cite_note-FIPNot ice-10 Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 34
  • 35. Fair Information Practices (FIPs), continued 35 ● Many laws embody the Fair Information Practices ○ GDPR, CCPA, HIPAA, Financial Privacy Act, COPPA, FERPA ● But, enforcement is a weakness here ○ If an org violates, can be hard to detect ○ In practice, limited resources for enforcement Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 35
  • 36. IoT security + privacy tensions multiplying … 36Cori Faklaris - Designing for Usable Privacy and Security, April 15, 2020 - Carnegie Mellon University - Page 36 Keyword Team. 2020. Apple and Google partner on COVID-19 contact tracing technology. Google. Retrieved April 14, 2020 from https://blog.google/inside-google/co mpany-announcements/apple-and- google-partner-covid-19-contact-tra cing-technology/
  • 37. 37
  • 38. Agenda for this lecture 38 ● Why care about designing for usable security + privacy ● Differences between security and privacy ○ Pessimistic vs. optimistic orientation to security ○ Data privacy vs. personal privacy ● Three-pronged approach to usable security + privacy ○ Make it invisible (where possible) ○ Offer better user interfaces (affordances, mappings, mental models, etc) ○ Train users (where necessary) ● Research that makes use of this approach Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 38 ��
  • 39. 3-prong approach to usable security + privacy 39Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 39 1. Make it invisible (where possible) 2. Offer better user interfaces (affordances, mappings, mental models, etc) 3. Train users (where necessary) https://www.yo utube.com/wat ch?v=p03TIGq Ec8o
  • 40. 3-prong approach to usable security + privacy 40Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 40 1. Make it invisible (where possible) 2. Offer better user interfaces (affordances, mappings, mental models, etc) 3. Train users (where necessary) My Work
  • 41. Good ‘invisible’ security means user is weak pt 41Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 41
  • 42. Security focus shifts to UX solutions and training 42Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 42
  • 43. User education is a challenge (pessimistic view) 43 ● Users are not motivated to learn about security ● Security is a secondary task ● Difficult to teach people to make right online trust decision without increasing false positives Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 43 “User education is a complete waste of time. It is about as much use as nailing jelly to a wall…. They are not interested…they just want to do their job.” Martin Overton, IBM security specialist http://news.cnet.com/21007350_361252132.html
  • 44. User education is a challenge in this work 44 ● Users are not motivated to learn about security ● Security is a secondary task ● Difficult to teach people to make right online trust decision without increasing false positives ● “User education is a complete waste of time. It is about as much use as nailing jelly to a wall…. They are not interested…they just want to do their job.” - Martin Overton, IBM security specialist http://news.cnet.com/21007350_361252132.html Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 44
  • 45. Actually, users ARE trainable (optimistic view) 45 ● Users want to keep themselves - and those they care about - safe ● Users can learn to protect themselves from phishing… if you can get them to pay attention to training ○ Create “teachable moments” ○ Make training fun ○ Use learning science principles Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 45 Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, and Jason Hong. 2010. Teaching Johnny not to fall for phish. ACM Trans. Internet Technol. 10, 2, Article 7 (June 2010), 31 pages. DOI: https://doi.org/10.1145/1754393.1754396
  • 46. Nova Cybersecurity Lab and Game 46Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 46 https://www.pbs.org/wgbh/nova/labs/l ab/cyber/ Great example of creating “teachable moments” and also injecting light-hearted humor and design with the simple game mechanics and lessons.
  • 47. Apps vs. Hackers (Ongoing research) 47Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 47 https://apps-vs-hacker s.firebaseapp.com/cla ssic Adapting “Plants vs. Zombies” game to a cybersecurity context
  • 48. Hacked Time (Ongoing research) 48Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 48 http://www.tianyingch en.com/hackedtime/ Choose Your Own Adventure, based in Self Efficacy Theory, narrative immersion
  • 49. These make use of principles to boost learning 49 ● Learning by doing – like our labs, get hands on practice ● Immediate feedback – better quickly than later ● Conceptual-procedural – Interleave abstract principles with concrete examples (like we’re doing right now!) Help people understand the principle, and offer examples to help people understand specifics, then back to principle to generalize ● Reflection – thinking about why you did something helps with retention (which is why we have this for homeworks) ● Multimedia – images, text, sound Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 49
  • 50. User studies help evaluate learning outcomes 50 ● Evaluation of PhishGuru system - is embedded training effective? ○ Study 1: Lab study, 30 participants ○ Study 2: Lab study, 42 participants ○ Study 3: Field trial at company, ~300 participants ○ Study 4: Field trial at CMU, ~500 participants ● Studies showed statistically significant decrease in falling for phish, increased ability to retain what they learned Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 50 Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge. 2007. Protecting people from phishing: the design and evaluation of an embedded training email system. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’07). Association for Computing Machinery, New York, NY, USA, 905–914. DOI:https://doi.org/10.1145/1240624.1240760
  • 51. Good interfaces for security + privacy are hard! 51 ● Lots of security terminology ○ Ex. You have digital keys to “encrypt” things ○ Ex. You can also use digital keys to sign things ● Lots of complexity ○ Ex. Might have multiple sharing policies ○ Ex. Some tasks might need to be harder to prevent attacks (account creation) ● Security is a secondary task ○ Ex. You don’t go to Dropbox to do security Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51
  • 52. 52
  • 53. 53 Sauvik Das, Gierad Laput, Chris Harrison, and Jason I. Hong. 2017. Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI ’17). Association for Computing Machinery, New York, NY, USA, 3764–3774. DOI: https://doi.org/10.1145/3025453.3025991
  • 54. Communication-Human Information Processing Model 54 ● See the warning? ● Understand? ● Believe it? ● Motivated? ● Can and will act? Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 54 Serge Egelman, Lorrie Faith Cranor, and Jason Hong. 2008. You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1065–1074. https://doi.org/10.1145/1357054.1357219 Make a recommendation, but leave it to the user to act
  • 55. Agenda for this lecture 55 ● Why care about designing for usable security + privacy ● Differences between security and privacy ○ Pessimistic vs. optimistic orientation to security ○ Data privacy vs. personal privacy ● Three-pronged approach to usable security + privacy ○ Make it invisible (where possible) ○ Offer better user interfaces (affordances, mappings, mental models, etc) ○ Train users (where necessary) ● Research that makes use of this approach Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 55 ��
  • 56. Communication-Human Information Processing Model 56 ● See the warning? ● Understand? ● Believe it? ● Motivated? ● Can and will act? Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 56 Serge Egelman, Lorrie Faith Cranor, and Jason Hong. 2008. You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1065–1074. https://doi.org/10.1145/1357054.1357219
  • 57. SA-6 Measures a User’s Security Attitude 57Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 57 Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following: ● Generally, I diligently follow a routine about security practices. ● I always pay attention to experts’ advice about the steps I need to take to keep my online data and accounts safe. ● I am extremely knowledgeable about all the steps needed to keep my online data and accounts safe. ● I am extremely motivated to take all the steps needed to keep my online data and accounts safe. ● I often am interested in articles about security threats. ● I seek out opportunities to learn about security measures that are relevant to me.
  • 58. SA-6 Measures a User’s Security Attitude 58Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51 Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following: ● Generally, I diligently follow a routine about security practices. ● I always pay attention to experts’ advice about the steps I need to take to keep my online data and accounts safe. ● I am extremely knowledgeable about all the steps needed to keep my online data and accounts safe. ● I am extremely motivated to take all the steps needed to keep my online data and accounts safe. ● I often am interested in articles about security threats. ● I seek out opportunities to learn about security measures that are relevant to me. TAKE THE QUIZ AT http://bit.ly/sa6quiz
  • 59. SA-6 Measures a User’s Security Attitude 59Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51 Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following: ● Generally, I diligently follow a routine about security practices. ● I always pay attention to experts’ advice about the steps I need to take to keep my online data and accounts safe. ● I am extremely knowledgeable about all the steps needed to keep my online data and accounts safe. ● I am extremely motivated to take all the steps needed to keep my online data and accounts safe. ● I often am interested in articles about security threats. ● I seek out opportunities to learn about security measures that are relevant to me. SEE RESPONSES AT http://bit.ly/sa6charts
  • 60. How to Use the SA-6 Psychometric Scale 60Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51 Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf Answer practical research questions such as: ● How attentive to security advice is a certain user group likely to be? ● Does a new awareness campaign or usability tool help or hurt a user’s attitude toward security compliance? Conduct theory-motivated research on human factors: ● Measure attitude in Elaboration Likelihood Model ● Measure motivation in Self-Determination Theory ● Measure coping appraisal in Protection Motivation Theory
  • 61. Social Contexts of Security Behavior 61Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51 Yunpeng Song, Cori Faklaris, Zhongmin Cai, Jason I. Hong, and Laura Dabbish. 2019. Normal and Easy: Account Sharing Practices in the Workplace. In Proceedings of the ACM: Human-Computer Interaction, Vol. 3, Issue CSCW, November 2019. ACM, New York, NY, USA. Available at: https://drive.google.com/file/d/17xb07vuKjPrgoKNzBSGouTgqNNEeACF0/view Workplace cybersecurity: Sharing accounts and devices to collaborate on tasks and to keep costs down. ● Workarounds are norm (ex: password taped to PC) ● Difficult to share and to control access with systems that presume one user at a time ● Lack of accountability and awareness of one person’s activities by others
  • 62. Social Contexts of Security Behavior 62Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51 Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish and Jason I. Hong. 2018. Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships. In Proceedings of the Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/conference/soups2018/soups2018-park.pdf Romantic cybersecurity: Sharing accounts and devices as relationships and households form and while working through the end of a relationship. ● Account sharing is both functional and emotional ● Usability challenges for romantic couples that share accounts and devices (such as 2FA tied to only one person’s device, breakups lead to data breaches)
  • 63. 63Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51 Safesea browser plugin for Google Chrome ● Helps Facebook users navigate privacy and security settings. ● Displays crowd and expert suggestions for settings. Social Contexts of Security Behavior
  • 64. Social Contexts of Security Behavior 64Cori Faklaris - Designing for Usable Security and Privacy, April 15, 2020 - Carnegie Mellon University - Page 51 ‘Fitness’ Tracking for cybersecurity: Could be used for contests or for sharing and displaying behavior changes, just like with physical fitness tracking
  • 65. Key takeaways for design ● Threat modeling - pay attention to “who” ○ Prevent Problems vs. Detect + Respond ○ Personal privacy vs. data privacy ● Fair Information Practices ● 3-pronged approach to usable security + privacy ○ Make it invisible, Better UIs, Train ● Learning science principles ● C-HIP model for warnings ○ Also useful for non-security warnings too! Cori Faklaris - Carnegie Mellon University - Page 65
  • 66. Key takeaways for YOU ● Use a password manager & install all legit software updates ● Sense of urgency is probably fake ● You’re not too smart to get fooled ● DON’T CLICK ANYTHING (google) ● Choose not easily guessable security questions ● No free lunch Cori Faklaris - Carnegie Mellon University - Page 66