SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors

Read original: arXiv:2404.10187 - Published 4/17/2024 by Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner
Total Score

0

SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper explores the relationship between sociodemographic factors and computer security behaviors.
  • The researchers conducted a quantitative study to investigate how factors like age, gender, education, and income level influence people's security practices.
  • The findings provide insights into the complex interplay between individual characteristics and cybersecurity behaviors.

Plain English Explanation

The paper examines how different personal characteristics like age, gender, education, and income can affect people's online security habits. The researchers gathered data and analyzed it to understand these connections.

For example, the study might have found that older adults tend to be more cautious about clicking on links in emails, while younger people are more likely to share sensitive information on social media. Or it could have discovered that individuals with higher education levels are better at creating secure passwords.

Understanding these sociodemographic factors and how they relate to cybersecurity behaviors is important. It can help us design more effective security interventions and educational programs tailored to different groups of people. By considering individual characteristics, we can create personalized solutions that are more likely to be adopted and effective.

Technical Explanation

The paper presents a systematic study of the quantitative relationships between sociodemographic factors and computer security behaviors. The researchers collected data through surveys and interviews, gathering information on participants' age, gender, education level, income, and a range of security practices, such as password management, software updates, and online sharing behaviors.

Using statistical analysis techniques, the team examined how these individual characteristics correlated with the security behaviors. The results revealed nuanced patterns, showing that certain factors like age and education level had significant impacts on specific security habits, while other variables like gender and income played a more complex role.

The findings suggest that a one-size-fits-all approach to cybersecurity education and intervention may not be effective. Instead, the authors recommend tailoring security advice and tools to different demographic groups, taking into account their unique needs, challenges, and motivations.

Critical Analysis

The paper provides a valuable contribution to the field by quantifying the influence of sociodemographic factors on computer security behaviors. However, the study is limited by its reliance on self-reported data, which may be subject to biases and inaccuracies. Additionally, the research was conducted in a specific geographical and cultural context, so the findings may not be generalizable to other populations.

Further research is needed to explore the intersectionality of these factors and their combined effects on security practices. The authors also acknowledge the need for longitudinal studies to understand how individual characteristics and behaviors evolve over time.

Conclusion

This paper offers important insights into the complex relationship between sociodemographic factors and computer security behaviors. By quantifying these connections, the researchers provide a valuable foundation for developing more targeted and effective security interventions and educational programs. The findings highlight the importance of considering individual characteristics when designing solutions to improve cybersecurity practices and protect users from online threats.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
Total Score

0

SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors

Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner

Researchers are increasingly exploring how gender, culture, and other sociodemographic factors correlate with user computer security and privacy behaviors. To more holistically understand relationships between these factors and behaviors, we make two contributions. First, we broadly survey existing scholarship on sociodemographics and secure behavior (151 papers) before conducting a focused literature review of 47 papers to synthesize what is currently known and identify open questions for future research. Second, by incorporating contemporary social and critical theories, we establish guidelines for future studies of sociodemographic factors and security behaviors that address how to overcome common pitfalls. We present a case study to demonstrate our guidelines in action, at-scale, that conduct a measurement study of the relationships between sociodemographics and de-identified, aggregated log data of security and privacy behaviors among 16,829 users on Facebook across 16 countries. Through these contributions, we position our work as a systemization of a lack of knowledge (SoLK). Overall, we find contradictory results and vast unknowns about how identity shapes security behavior. Through our guidelines and discussion, we chart new directions to more deeply examine how and why sociodemographic factors affect security behaviors.

Read more

4/17/2024

↗️

Total Score

0

Security and Privacy Product Inclusion

Dave Kleidermacher, Emmanuel Arriaga, Eric Wang, Sebastian Porst, Roger Piqueras Jover

In this paper, we explore the challenges of ensuring security and privacy for users from diverse demographic backgrounds. We propose a threat modeling approach to identify potential risks and countermeasures for product inclusion in security and privacy. We discuss various factors that can affect a user's ability to achieve a high level of security and privacy, including low-income demographics, poor connectivity, shared device usage, ML fairness, etc. We present results from a global security and privacy user experience survey and discuss the implications for product developers. Our work highlights the need for a more inclusive approach to security and privacy and provides a framework for researchers and practitioners to consider when designing products and services for a diverse range of users.

Read more

4/23/2024

Sociodemographic Bias in Language Models: A Survey and Forward Path
Total Score

0

Sociodemographic Bias in Language Models: A Survey and Forward Path

Vipul Gupta, Pranav Narayanan Venkit, Shomir Wilson, Rebecca J. Passonneau

Sociodemographic bias in language models (LMs) has the potential for harm when deployed in real-world settings. This paper presents a comprehensive survey of the past decade of research on sociodemographic bias in LMs, organized into a typology that facilitates examining the different aims: types of bias, quantifying bias, and debiasing techniques. We track the evolution of the latter two questions, then identify current trends and their limitations, as well as emerging techniques. To guide future research towards more effective and reliable solutions, and to help authors situate their work within this broad landscape, we conclude with a checklist of open questions.

Read more

8/15/2024

State surveillance in the digital age: Factors associated with citizens' attitudes towards trust registers
Total Score

0

State surveillance in the digital age: Factors associated with citizens' attitudes towards trust registers

Katja Turha, Simon Vrhovec, Igor Bernik

This paper investigates factors related to the acceptance of trust registers (e.g., the Chinese Social Credit System - SCS) in Western settings. To avoid a negative connotation, we first define the concept of trust register which encompasses surveillance systems in other settings beyond China, such as FICO in the US. Then, we explore which factors are associated with people's attitude towards trust registers leaning on the technology acceptance and privacy concern theories. A cross-sectional survey among Slovenian Facebook and Instagram users (N=147) was conducted. Covariance-based structural equation modeling (CB-SEM) was used to test the hypothesized associations between the studied constructs. Results indicate that attitude towards trust register is directly associated with perceived general usefulness of the trust register. Additionally, perceived general usefulness is associated with perceived usefulness of the trust register for ensuring national security and fighting crime, its ease of use, and privacy concern regarding data collection. As one of the first studies investigating attitude towards trust registers in a Western country, it provides pioneering insights into factors that may be relevant in case such registers would be implemented in a Western context, and provides some practical implications regarding messaging for would-be implementers of such systems.

Read more

8/20/2024