SlideShare a Scribd company logo
Survey
Part I: the
Professor
Part II: the
Student
Survey
Interactions between Security Interfaces, Learning, and Sensitivity of Information
Lezlie España (Wisconsin Lutheran College), Rick Wash, Kami Vaniea, Emilee Rader (Michigan State University BITLab)
Purpose:
We want to understand more about online security interfaces and what people learn from them.
Specifically, do people learn that certain types of information are sensitive or non-sensitive based on the information that is
accessible via the log in process online?
Survey
One-time login: Users
logged in once to see all
content on the site
No login: Users were
automatically logged in
to the site
Sensitive: Users
logged in every time they
visited a page that
contained sensitive
information
Non-sensitive: Users
logged in every time they
visited a page that
contained non-sensitive
information
Retrieve pieces of
information about students
from the site
Log in to view different
types of information
Fill out the incomplete
student profile
Select privacy settings for
each piece of information
Intended to add an additional
measure for changes in security
awareness and privacy concerns
about sensitive informationGauge privacy concerns
about sensitive information
Set the context of a beta test
for class websites testing
functionality and usability
What constitutes sensitive information?
We conducted two sensitivity surveys to determine what types of information we should
use in the experiment:
100 subjects per survey were recruited through Amazon Mechanical Turk
Gender distribution across both surveys: 60% men, 40% women
Conditions
Context is key!
The information considered sensitive depends greatly on where that information is being shared and its
intended use within that context. Determining context played an integral part in the design of the experiment and
choosing what types of information to use in the experiment itself.
Social Networks Survey
M age: 33.5
R age: 18-65
3 parts: Facebook, LinkedIn, Other
Student Class Website Survey:
M age: 32.5
R age: 18-67
4.91
4.52 4.51
3.85 3.69 3.42 3.24 3.02
1.96 1.88
4.95
4.62 4.46
3.89
3.34
2.94 2.75 2.75
1.66 1.66
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
Social Security
Number
Home Address Mobile Phone
Number
E-mail Address Standardized
Test Scores
Friends Birthday Marital Status Known
Languages
Gender
SensitivityMean
Student Class Website
Survey
Social Networks Survey
Sensitivity was measured using a Likert scale from 1-5, 1
being “Not Sensitive” and 5 being “Very Sensitive”
Some information is consistent
across contexts: Social Security
Number, Mobile Phone Number, E-mail
Address
Sensitivity of information can
change over time: Phone numbers used
to be listed in the white pages but are
now considered more sensitive
Survey Findings
This material is based upon work supported by the National
Science Foundation under Grant No. CNS-1116544 and CNS-
1115926.
Experiment

More Related Content

What's hot

CYBERBULLY IDENTIFICATION SYSTEM
CYBERBULLY IDENTIFICATION SYSTEMCYBERBULLY IDENTIFICATION SYSTEM
CYBERBULLY IDENTIFICATION SYSTEM
Irrna Izzate Mohd Ali
 
PropPresentation
PropPresentationPropPresentation
PropPresentation
Asanda Miya
 
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Darrell W. Gunter
 
Identification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A SurveyIdentification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A Survey
Cybersecurity Education and Research Centre
 
Evaluating a Web Site
Evaluating a Web SiteEvaluating a Web Site
Evaluating a Web Site
lee
 
Students and Social Media: Current Uses and Emerging Practices
Students and Social Media: Current Uses and Emerging PracticesStudents and Social Media: Current Uses and Emerging Practices
Students and Social Media: Current Uses and Emerging Practices
Eric Hodgson
 
Mobile Technologies
Mobile TechnologiesMobile Technologies
Mobile Technologies
darylyne_provost
 

What's hot (7)

CYBERBULLY IDENTIFICATION SYSTEM
CYBERBULLY IDENTIFICATION SYSTEMCYBERBULLY IDENTIFICATION SYSTEM
CYBERBULLY IDENTIFICATION SYSTEM
 
PropPresentation
PropPresentationPropPresentation
PropPresentation
 
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
 
Identification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A SurveyIdentification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A Survey
 
Evaluating a Web Site
Evaluating a Web SiteEvaluating a Web Site
Evaluating a Web Site
 
Students and Social Media: Current Uses and Emerging Practices
Students and Social Media: Current Uses and Emerging PracticesStudents and Social Media: Current Uses and Emerging Practices
Students and Social Media: Current Uses and Emerging Practices
 
Mobile Technologies
Mobile TechnologiesMobile Technologies
Mobile Technologies
 

Similar to Lezlie_MID-SURE2014

CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera ready
Mark Sinclair
 
Are we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media researchAre we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media research
TheSRAOrg
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
mebrahten1
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
Ayesha Lata
 
Survey Methodology for Security and Privacy Researchers
Survey Methodology for Security and Privacy ResearchersSurvey Methodology for Security and Privacy Researchers
Survey Methodology for Security and Privacy Researchers
Elissa Redmiles
 
RESEARCH PROPOSAL .pptx
RESEARCH PROPOSAL .pptxRESEARCH PROPOSAL .pptx
RESEARCH PROPOSAL .pptx
lyndemae
 
Safety And Security on the Net Podcast
Safety And Security on the Net PodcastSafety And Security on the Net Podcast
Safety And Security on the Net Podcast
Kylie Stewart
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
Kandy Woodfield
 
MPH Online Identity April 2022.pdf
MPH Online Identity April 2022.pdfMPH Online Identity April 2022.pdf
MPH Online Identity April 2022.pdf
KR_Barker
 
KnowMe and ShareMe: understanding automatically discovered personality traits...
KnowMe and ShareMe: understanding automatically discovered personality traits...KnowMe and ShareMe: understanding automatically discovered personality traits...
KnowMe and ShareMe: understanding automatically discovered personality traits...
Leon Gou
 
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
Jason Hong
 
Naffi_Nadia_2012_Learning to Exist in Social Media- A grounded Theory About ...
Naffi_Nadia_2012_Learning to Exist in Social Media-  A grounded Theory About ...Naffi_Nadia_2012_Learning to Exist in Social Media-  A grounded Theory About ...
Naffi_Nadia_2012_Learning to Exist in Social Media- A grounded Theory About ...
Nadia Naffi, Ph.D.
 
204
204204
Spring Quant Final Presentation-Camp Viololence (1)
Spring Quant Final Presentation-Camp Viololence (1)Spring Quant Final Presentation-Camp Viololence (1)
Spring Quant Final Presentation-Camp Viololence (1)
Elliott Coney, Ed.D
 
How to Make People Click on a Dangerous Link Despite their Security Awareness
How to Make People Click on a Dangerous Link Despite their Security Awareness How to Make People Click on a Dangerous Link Despite their Security Awareness
How to Make People Click on a Dangerous Link Despite their Security Awareness
mark-smith
 
Expanding Potential Poster
Expanding Potential PosterExpanding Potential Poster
Expanding Potential Poster
Josue Ayala
 
Information Skills in a Global 2.0 World
Information Skills in a Global 2.0 WorldInformation Skills in a Global 2.0 World
Information Skills in a Global 2.0 World
Kelly Lambert
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
JEM JEM
 
Survey Research
Survey ResearchSurvey Research
Survey Research
atrantham
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
ITIIIndustries
 

Similar to Lezlie_MID-SURE2014 (20)

CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera ready
 
Are we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media researchAre we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media research
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
 
Survey Methodology for Security and Privacy Researchers
Survey Methodology for Security and Privacy ResearchersSurvey Methodology for Security and Privacy Researchers
Survey Methodology for Security and Privacy Researchers
 
RESEARCH PROPOSAL .pptx
RESEARCH PROPOSAL .pptxRESEARCH PROPOSAL .pptx
RESEARCH PROPOSAL .pptx
 
Safety And Security on the Net Podcast
Safety And Security on the Net PodcastSafety And Security on the Net Podcast
Safety And Security on the Net Podcast
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
MPH Online Identity April 2022.pdf
MPH Online Identity April 2022.pdfMPH Online Identity April 2022.pdf
MPH Online Identity April 2022.pdf
 
KnowMe and ShareMe: understanding automatically discovered personality traits...
KnowMe and ShareMe: understanding automatically discovered personality traits...KnowMe and ShareMe: understanding automatically discovered personality traits...
KnowMe and ShareMe: understanding automatically discovered personality traits...
 
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
 
Naffi_Nadia_2012_Learning to Exist in Social Media- A grounded Theory About ...
Naffi_Nadia_2012_Learning to Exist in Social Media-  A grounded Theory About ...Naffi_Nadia_2012_Learning to Exist in Social Media-  A grounded Theory About ...
Naffi_Nadia_2012_Learning to Exist in Social Media- A grounded Theory About ...
 
204
204204
204
 
Spring Quant Final Presentation-Camp Viololence (1)
Spring Quant Final Presentation-Camp Viololence (1)Spring Quant Final Presentation-Camp Viololence (1)
Spring Quant Final Presentation-Camp Viololence (1)
 
How to Make People Click on a Dangerous Link Despite their Security Awareness
How to Make People Click on a Dangerous Link Despite their Security Awareness How to Make People Click on a Dangerous Link Despite their Security Awareness
How to Make People Click on a Dangerous Link Despite their Security Awareness
 
Expanding Potential Poster
Expanding Potential PosterExpanding Potential Poster
Expanding Potential Poster
 
Information Skills in a Global 2.0 World
Information Skills in a Global 2.0 WorldInformation Skills in a Global 2.0 World
Information Skills in a Global 2.0 World
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
Survey Research
Survey ResearchSurvey Research
Survey Research
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 

Lezlie_MID-SURE2014

  • 1. Survey Part I: the Professor Part II: the Student Survey Interactions between Security Interfaces, Learning, and Sensitivity of Information Lezlie España (Wisconsin Lutheran College), Rick Wash, Kami Vaniea, Emilee Rader (Michigan State University BITLab) Purpose: We want to understand more about online security interfaces and what people learn from them. Specifically, do people learn that certain types of information are sensitive or non-sensitive based on the information that is accessible via the log in process online? Survey One-time login: Users logged in once to see all content on the site No login: Users were automatically logged in to the site Sensitive: Users logged in every time they visited a page that contained sensitive information Non-sensitive: Users logged in every time they visited a page that contained non-sensitive information Retrieve pieces of information about students from the site Log in to view different types of information Fill out the incomplete student profile Select privacy settings for each piece of information Intended to add an additional measure for changes in security awareness and privacy concerns about sensitive informationGauge privacy concerns about sensitive information Set the context of a beta test for class websites testing functionality and usability What constitutes sensitive information? We conducted two sensitivity surveys to determine what types of information we should use in the experiment: 100 subjects per survey were recruited through Amazon Mechanical Turk Gender distribution across both surveys: 60% men, 40% women Conditions Context is key! The information considered sensitive depends greatly on where that information is being shared and its intended use within that context. Determining context played an integral part in the design of the experiment and choosing what types of information to use in the experiment itself. Social Networks Survey M age: 33.5 R age: 18-65 3 parts: Facebook, LinkedIn, Other Student Class Website Survey: M age: 32.5 R age: 18-67 4.91 4.52 4.51 3.85 3.69 3.42 3.24 3.02 1.96 1.88 4.95 4.62 4.46 3.89 3.34 2.94 2.75 2.75 1.66 1.66 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 Social Security Number Home Address Mobile Phone Number E-mail Address Standardized Test Scores Friends Birthday Marital Status Known Languages Gender SensitivityMean Student Class Website Survey Social Networks Survey Sensitivity was measured using a Likert scale from 1-5, 1 being “Not Sensitive” and 5 being “Very Sensitive” Some information is consistent across contexts: Social Security Number, Mobile Phone Number, E-mail Address Sensitivity of information can change over time: Phone numbers used to be listed in the white pages but are now considered more sensitive Survey Findings This material is based upon work supported by the National Science Foundation under Grant No. CNS-1116544 and CNS- 1115926. Experiment