SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
A Self-Report Measure
of End-User
Security Attitudes (SA-6)
Cori Faklaris, Laura Dabbish and Jason I. Hong
Human-Computer Interaction Institute
Usenix Symposium on Usable Privacy and Security (SOUPS 2019), Aug. 12, 2019, Santa Clara, CA, USA
Key takeaways
1. SA-6 is a lightweight tool to quantify and
compare people’s attitudes toward using
recommended security tools and practices.
2. SA-6 may help to improve predictive modeling
of who will adopt such behaviors.
2Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
SA-6 is a lightweight tool to quantify and compare security attitudes
3Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
▪ Generally, I diligently follow a routine about security practices.
▪ I always pay attention to experts’ advice about the steps I need to take
to keep my online data and accounts safe.
▪ I am extremely knowledgeable about all the steps needed to keep my
online data and accounts safe.
▪ I am extremely motivated to take all the steps needed to keep my online
data and accounts safe.
▪ I often am interested in articles about security threats.
▪ I seek out opportunities to learn about security measures that are
relevant to me.
On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following:
4Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
SA-6 may help to improve predictive modeling of security adoption
Attitude toward
security behavior
Security
behavior
intention
Security
behavior
SA-6
SeBIS
Recalled
actions
Better predictive modeling = better targeting of interventions
▪ Much usability research
employs in-depth
interviews and
observations.
▪ But this is not always
feasible or desirable.
5Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Our field needs reliable and validated psychometric scales
https://giphy.com/gifs/heyarnold-hey-arnold-nicksplat-xT1R9EbolF7trQnIyI
Our field needs reliable and validated psychometric scales
▪ For large-scale,
longitudinal or
time-sensitive research,
we need an online survey
form that can be given
with other scales or
questionnaires.
6Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
▪ Knowing users’ attitudes,
intentions and behaviors helps
us craft security tools that are:
▫ Useful
▫ Easy to use
▫ Satisfying to users
7
https://www.interaction-design.org/literature/topics/usability
Our field needs reliable and validated psychometric scales
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Our field needs reliable and validated psychometric scales
▪ An attitude scale helps answer
research questions such as:
▫ How attentive to security
advice is a certain user group
likely to be?
▫ Does a new tool help or hurt a
user’s attitude toward security
compliance?
8Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Current state of the art is SeBIS (Egelman & Peer 2015)
▪ 16-item self-report inventory in four areas:
▫ Password generation
▫ Proactive awareness
▫ Software updates
▫ Device securement
But it has limitations:
▪ Specific to behavior intentions, not to attitudes.
▪ Tech-specific wording may become outdated.
The Security Behavior Intentions Scale (SeBIS) isn’t enough
9Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
▪ Theory of Reasoned Action
▫ Technology Acceptance Model
▫ Diffusion of Innovation Theory
▪ Elaboration Likelihood Model
▪ Self-Determination Theory
▪ Protection Motivation Theory
An additional scale is needed to conduct theory-motivated research
10Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Behavior
Intention
Attitude
Fishbein & Azjen 1967, 2010; Davis et al. 1989; Rogers 2010;
Petty & Cacioppo 1980; Ryan & Deci 2000; Rogers 1975
Best practice: Generate candidate items from prior work (Das et al. 2017)
11
Awareness Motivation Knowledge
Security Sensitivity
to engage in expert-recommended security practices
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Attitude
▪ A security breach, if one occurs, is not likely to cause significant harm to
my online identity or accounts.
▪ Generally, I am aware of existing security threats.
▪ Generally, I am willing to spend money to use security measures that
counteract the threats that are relevant to me.
▪ Generally, I care about security and privacy threats.
▪ Generally, I diligently follow a routine about security practices.
▪ Generally, I know how to figure out if an email was sent by a scam
artist.
▪ Generally, I know how to use security measures to counteract the
threats that are relevant to me.
▪ Generally, I know which security threats are relevant to me.
Best practice: Test many different item variations for SA-6 (60+ to start)
12Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
▪ SeBIS scale, 16 items
▪ Internet Know-How, 9 items
▪ Technical Know-How, 9 items
▪ Internet Users Information Privacy Concerns scale, 10 items
▪ Frequency of falling victim to a security breach, 2 items
▪ Amount heard or seen about security breaches, 1 item
▪ Barratt Impulsiveness Scale, 30 items
▪ Privacy Concerns Scale, 16 items
▪ Ten-Item Personality Inventory, 10 items
▪ General Self-Efficacy scale, 11 items
▪ Social Self-Efficacy scale, 5 items
▪ Confidence in Using Computers, 12 items
Best practice: Collect measures theorized to relate with SA-6
13Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
14
Best practice: Collect measures theorized to relate with SA-6
Test convergent validity
▪ RQ1a: Is SA-6 positively
correlated with SeBIS?
▪ RQ1b: Do other measures
thought to relate with
security attitude correlate
with SA-6?
Test discriminant validity
▪ RQ2a: Does SA-6 vary with
respect to background
social factors (e.g. age,
gender)?
▪ RQ2b: Does SA-6 vary
with past experiences of
security breaches?
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Samples not significantly
different by age
[overall X^2(4,
N=475)=11.42, p = n.s.]
or gender
[X^2(1, N = 475) =2.95,
p = n.s.]
Amazon Mechanical Turk
sample
15
Best practice: Use a large, diverse sample for finalizing scale items
Meets recommended ratio (5:1 to 10:1) of responses to scale items
N =
475
University-run study pool
sample
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Best practice: Repeat study in a representative sample to validate scale
16
N =
209
Qualtrics-filled panel with age, gender & income tailored to U.S. population
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
17
Best practice: Iterative analyses to zero in on the items for the scale
Factor tests
▪ Exploratory
Factor Analysis
to check item
correlations (SPSS)
▪ Reliability
Analysis (alpha)
to confirm internal
consistency
Model tests
▪ Confirmatory
Factor Analysis
to check goodness
of fit (MPlus)
▪ Run several CFA
models to make
sure we specified
the best model
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
SA-6 scale items (SPSS Principal Components Analysis) Factor loading
I seek out opportunities to learn about security measures that are
relevant to me.
0.81
I am extremely motivated to take all the steps needed to keep my
online data and accounts safe.
0.78
Generally, I diligently follow a routine about security practices. 0.77
I often am interested in articles about security threats. 0.72
I always pay attention to experts' advice about the steps I need to
take to keep my online data and accounts safe.
0.71
I am extremely knowledgeable about all the steps needed to keep my
online data and accounts safe. 0.71
SA-6 demonstrates desired consistency + fit for a psychometric scale
18
ɑ=.84
CFI=.91
SRMR
=.05
SA-6 scale items (SPSS Principal Components Analysis) Factor loading
I seek out opportunities to learn about security measures that are
relevant to me.
0.81
I am extremely motivated to take all the steps needed to keep my
online data and accounts safe.
0.78
Generally, I diligently follow a routine about security practices. 0.77
I often am interested in articles about security threats. 0.72
I always pay attention to experts' advice about the steps I need to
take to keep my online data and accounts safe.
0.71
I am extremely knowledgeable about all the steps needed to keep my
online data and accounts safe. 0.71
SA-6 = attentiveness to and engagement with cybersecurity measures
19
20
Best practice: Statistical testing of SA-6 as a valid attitude measure
Factor tests
▪ Exploratory
Factor Analysis
to check item
correlations (SPSS)
▪ Reliability
Analysis (alpha)
to confirm internal
consistency
Model tests
▪ Confirmatory
Factor Analysis
to check goodness
of fit (MPlus)
▪ Run several CFA
models to make
sure we specified
the best model
Validity tests
▪ Test relationships +
differences with
other variables (SPSS)
▪ Also tested for
ability to predict
participants’ recalled
security actions in
past week
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
21
Best practice: Test for expected associations with SA-6
Attitude toward
security behavior
Security
behavior
intention
SA-6 SeBIS
r=.540, p<.01
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Faklaris et
al. 2019
Egelman &
Peer 2015
▪ RQ1a: Is SA-6 positively
correlated with SeBIS?
▪ Yes.
22
Best practice: Test for expected associations with SA-6
▪ RQ1a: Is SA-6 positively
correlated with SeBIS?
▪ Yes.
Attitude toward
security behavior
Security
behavior
intention
SA-6 SeBIS
R2
=.280,
p<.001
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Faklaris et
al. 2019
Egelman &
Peer 2015
23
Best practice: Test for expected associations with SA-6
- With the
Internet Users’
Informational
Privacy Concerns
(IUIPC) scale
- With the
Privacy Concerns
Scale (PCS)
r=.390,
p<.01
r=.382,
p<.01
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Malhotra et
al. 2004
Buchanan
et al. 2007
▪ RQ1b: Do other measures
thought to relate with
security attitude correlate
with SA-6?
▪ Yes.
24
Best practice: Test for expected associations with SA-6
- With the Barratt
Impulsiveness
Scale
- With the General
Self-Efficacy scale
- With the Social
Self-Efficacy scale
r=.180,
p<.01
r=.208,
p<.01
r=.363,
p<.01
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Stanford et
al. 2009
(update)
Zimmerman
et al. 2000
Zimmerman
et al. 2000
▪ RQ1b: Do other measures
thought to relate with
security attitude correlate
with SA-6?
▪ Yes.
25
Best practice: Test for expected associations with SA-6
▪ RQ1b: Do other measures
thought to relate with
security attitude correlate
with SA-6?
▪ Yes.
- With the Kang
Internet
Know-How scale
- w/Confidence in
using computers
- w/Web-oriented
digital literacy
r=.542,
p<.01
r=.280,
p<.05
r=.503,
p<.05
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Kang et al.
2015
Fogarty et
al. 2001
(adapted)
Hargittai
2005
26
Best practice: Test for expected differences in SA-6 by subgroup
▪ RQ2a: Does SA-6 vary with background factors? Yes.
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
SA-6 Mean (SD) t(df), p
Age group
18-39
3.40 (.81)
40 +
3.69 (.76)
t(207)= -2.172, p<.05
Gender
Male
3.77 (.71)
Female
3.53 (.81)
t(198.38)= 2.19, p<.05
27
Best practice: Test for expected differences in SA-6 by subgroup
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
SA-6 Mean (SD) t(df), p
College attendance
No college
3.42 (.79)
Attended college
3.73 (.76)
t(207)=-2.76, p<.01
Income level
Below $25K
3.30 (.71)
Above $25K
3.73 (.77)
t(207)=-3.42, p<.005
▪ RQ2a: Does SA-6 vary with background factors? Yes.
▪ RQ2b: Does SA-6 vary with past breach experiences? Yes.
SA-6 Mean (SD) t(df), p
Low High
Themselves falling victim to a security breach 3.56 (.78) 4.13 (.58) t(41.46) = -4.54, p<.001
Close friends or relatives falling victim 3.57 (.76) 4.10 (.74) t(207)= -3.40, p<.005
Heard about security breaches in the past year 3.35 (.80) 3.77 (.74) t(207)=-3.77, p<.001
28
Best practice: Test for expected differences in SA-6 by subgroup
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Test support for predictive validity
▪ RQ3: Does a person’s SA-6 score positively associate with a measure
of self-reported security behaviors within the past week?
▪ Collected 10 items based on SeBIS, 5-level agreement scale (RSec)
29
Best practice: Collect measures theorized to relate with SA-6
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Ex: “In the past week, I have verified at least
once that my antivirus software is up to date.”
30
Best practice: Test for SA-6’s influence on outcome variables
Attitude toward
security behavior
Security
behavior
SA-6 RSec
r=.398,
p<.001
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Faklaris et
al. 2019
▪ RQ3: Does SA-6 positively
associate with a measure of
self-reported security
behaviors within the past
week (RSec)?
▪ Yes.
Faklaris et
al. 2019
31
Best practice: Test for SA-6’s influence on outcome variables
Attitude toward
security behavior
Security
behavior
intention
Security
behavior
SA-6
SeBIS
RSec
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Faklaris et
al. 2019
Faklaris et
al. 2019
Egelman & Peer 2015
R2
=.280,
p<.001
32
Best practice: Test for SA-6’s influence on outcome variables
Attitude toward
security behavior
Security
behavior
intention
Security
behavior
SA-6
SeBIS
RSec
R2
=.235,
p<.001
R2
=.280,
p<.001
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Faklaris et
al. 2019
Faklaris et
al. 2019
Egelman & Peer 2015
33
Best practice: Test for SA-6’s influence on outcome variables
Attitude toward
security behavior
Security
behavior
intention
Security
behavior
SA-6
SeBIS
RSec
R2
=.158,
p<.001
Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Faklaris et
al. 2019
Faklaris et
al. 2019
Egelman & Peer 2015
R2
=.235,
p<.001
R2
=.280,
p<.001
34Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
SA-6 can improve predictive modeling + targeting of interventions
Attitude toward
security behavior
Security
behavior
intention
Security
behavior
SA-6
SeBIS
RSec
Low SA-6 → boost awareness/motivation; High SA-6 → boost skill/ability
Faklaris et
al. 2019
Faklaris et
al. 2019
Egelman & Peer 2015
R2
=.158,
p<.001
R2
=.235,
p<.001
R2
=.280,
p<.001
SA-6 can be helpful in your own usable security research
▪ Easily administer SA-6 via online survey
form with other scales or questionnaires.
▪ Answer research questions such as
▫ How attentive to security advice is a
certain user group likely to be?
▫ Does a new tool help or hurt a user’s
attitude toward security compliance?
35Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
https://socialcybersecurity.org/sa6.html
SA-6 can be helpful in your own usable security research
▪ Test hypotheses & models motivated by:
▫ Theory of Reasoned Action,
▫ Elaboration Likelihood Model,
▫ Self-Determination Theory,
▫ Protection Motivation Theory,
▫ Other theories and frameworks.
36Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
https://socialcybersecurity.org/sa6.html
Take the Security Attitude quiz at SocialCybersecurity.org/sa6quiz
37Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
Get the SA-6 scale & follow our work:
○ Twitter: @heycori | Email: heycori @cmu.edu
○ https://socialcybersecurity.org/sa6.html
38
Key takeaways
1. SA-6 is a lightweight tool to quantify and
compare people’s attitudes toward using
recommended security tools and practices.
2. SA-6 may help to improve predictive
modeling of who will adopt such behaviors.
Thank you to

Más contenido relacionado

Similar a A Self-Report Measure of End-User Security Attitudes (SA-6)

The Security Practitioner of the Future
The Security Practitioner of the FutureThe Security Practitioner of the Future
The Security Practitioner of the FutureResolver Inc.
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...akquinet enterprise solutions GmbH
 
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...EC-Council
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...Raleigh ISSA
 
[Webinar] Scaling experimentation: 5 key pillars of maturity by Nick So
[Webinar] Scaling experimentation: 5 key pillars of maturity by Nick So[Webinar] Scaling experimentation: 5 key pillars of maturity by Nick So
[Webinar] Scaling experimentation: 5 key pillars of maturity by Nick SoChris Goward
 
ideas-safety-bbs-presentation.pptx
ideas-safety-bbs-presentation.pptxideas-safety-bbs-presentation.pptx
ideas-safety-bbs-presentation.pptxbinasnasar1
 
Yin and Yang: Metrics within Agile and Traditional Lifecycles
Yin and Yang: Metrics within Agile and Traditional LifecyclesYin and Yang: Metrics within Agile and Traditional Lifecycles
Yin and Yang: Metrics within Agile and Traditional LifecyclesTechWell
 
ARC's Asish Ghosh's Creating Safety Culture Presentation Presentation at ARC'...
ARC's Asish Ghosh's Creating Safety Culture Presentation Presentation at ARC'...ARC's Asish Ghosh's Creating Safety Culture Presentation Presentation at ARC'...
ARC's Asish Ghosh's Creating Safety Culture Presentation Presentation at ARC'...ARC Advisory Group
 
Journey to Safety Excellence – Tagline or Tangible Resource?
Journey to Safety Excellence – Tagline or Tangible Resource?Journey to Safety Excellence – Tagline or Tangible Resource?
Journey to Safety Excellence – Tagline or Tangible Resource?browzcompliance
 
Technology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session SummaryTechnology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session SummaryWCapra
 
Psychosocial Dx: Identifying Invisible 45003 Factors
Psychosocial Dx: Identifying Invisible 45003 FactorsPsychosocial Dx: Identifying Invisible 45003 Factors
Psychosocial Dx: Identifying Invisible 45003 Factorsmyosh team
 
Eapp Evaluation
Eapp EvaluationEapp Evaluation
Eapp EvaluationPGAEAPP
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamJohn D. Johnson
 
A Pulse of Predictive Analytics In Higher Education │ Civitas Learning
A Pulse of Predictive Analytics In Higher Education │ Civitas LearningA Pulse of Predictive Analytics In Higher Education │ Civitas Learning
A Pulse of Predictive Analytics In Higher Education │ Civitas LearningCivitas Learning
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Data Analytics: Better Decision, Better Business
Data Analytics: Better Decision, Better BusinessData Analytics: Better Decision, Better Business
Data Analytics: Better Decision, Better BusinessMcKonly & Asbury, LLP
 
Operational Leadership and Critical Risk Management
Operational Leadership and Critical Risk ManagementOperational Leadership and Critical Risk Management
Operational Leadership and Critical Risk Managementmyosh team
 
Safety webinar with mark friend
Safety webinar with mark friendSafety webinar with mark friend
Safety webinar with mark friendERAUWebinars
 

Similar a A Self-Report Measure of End-User Security Attitudes (SA-6) (20)

The Security Practitioner of the Future
The Security Practitioner of the FutureThe Security Practitioner of the Future
The Security Practitioner of the Future
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
 
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...
 
PB CV v0.4
PB CV v0.4PB CV v0.4
PB CV v0.4
 
[Webinar] Scaling experimentation: 5 key pillars of maturity by Nick So
[Webinar] Scaling experimentation: 5 key pillars of maturity by Nick So[Webinar] Scaling experimentation: 5 key pillars of maturity by Nick So
[Webinar] Scaling experimentation: 5 key pillars of maturity by Nick So
 
ideas-safety-bbs-presentation.pptx
ideas-safety-bbs-presentation.pptxideas-safety-bbs-presentation.pptx
ideas-safety-bbs-presentation.pptx
 
Yin and Yang: Metrics within Agile and Traditional Lifecycles
Yin and Yang: Metrics within Agile and Traditional LifecyclesYin and Yang: Metrics within Agile and Traditional Lifecycles
Yin and Yang: Metrics within Agile and Traditional Lifecycles
 
ARC's Asish Ghosh's Creating Safety Culture Presentation Presentation at ARC'...
ARC's Asish Ghosh's Creating Safety Culture Presentation Presentation at ARC'...ARC's Asish Ghosh's Creating Safety Culture Presentation Presentation at ARC'...
ARC's Asish Ghosh's Creating Safety Culture Presentation Presentation at ARC'...
 
Journey to Safety Excellence – Tagline or Tangible Resource?
Journey to Safety Excellence – Tagline or Tangible Resource?Journey to Safety Excellence – Tagline or Tangible Resource?
Journey to Safety Excellence – Tagline or Tangible Resource?
 
Technology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session SummaryTechnology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session Summary
 
Psychosocial Dx: Identifying Invisible 45003 Factors
Psychosocial Dx: Identifying Invisible 45003 FactorsPsychosocial Dx: Identifying Invisible 45003 Factors
Psychosocial Dx: Identifying Invisible 45003 Factors
 
Eapp Evaluation
Eapp EvaluationEapp Evaluation
Eapp Evaluation
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive Team
 
A Pulse of Predictive Analytics In Higher Education │ Civitas Learning
A Pulse of Predictive Analytics In Higher Education │ Civitas LearningA Pulse of Predictive Analytics In Higher Education │ Civitas Learning
A Pulse of Predictive Analytics In Higher Education │ Civitas Learning
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Data Analytics: Better Decision, Better Business
Data Analytics: Better Decision, Better BusinessData Analytics: Better Decision, Better Business
Data Analytics: Better Decision, Better Business
 
Operational Leadership and Critical Risk Management
Operational Leadership and Critical Risk ManagementOperational Leadership and Critical Risk Management
Operational Leadership and Critical Risk Management
 
Safety webinar with mark friend
Safety webinar with mark friendSafety webinar with mark friend
Safety webinar with mark friend
 

Más de Cori Faklaris

Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid EdgeCori Faklaris
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AICori Faklaris
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionCori Faklaris
 
Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social InfluencesCori Faklaris
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and PrivacyCori Faklaris
 
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...Cori Faklaris
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Cori Faklaris
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Cori Faklaris
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Cori Faklaris
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”Cori Faklaris
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Cori Faklaris
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...Cori Faklaris
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slidesCori Faklaris
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesCori Faklaris
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile Cori Faklaris
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning studentCori Faklaris
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineCori Faklaris
 

Más de Cori Faklaris (17)

Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid Edge
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social Influences
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and Privacy
 
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanites
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement online
 

Último

➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...amitlee9823
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...only4webmaster01
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...amitlee9823
 
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...amitlee9823
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Researchmichael115558
 
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...amitlee9823
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...amitlee9823
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...amitlee9823
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...Elaine Werffeli
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...gajnagarg
 

Último (20)

➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
 
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...
 

A Self-Report Measure of End-User Security Attitudes (SA-6)

  • 1. A Self-Report Measure of End-User Security Attitudes (SA-6) Cori Faklaris, Laura Dabbish and Jason I. Hong Human-Computer Interaction Institute Usenix Symposium on Usable Privacy and Security (SOUPS 2019), Aug. 12, 2019, Santa Clara, CA, USA
  • 2. Key takeaways 1. SA-6 is a lightweight tool to quantify and compare people’s attitudes toward using recommended security tools and practices. 2. SA-6 may help to improve predictive modeling of who will adopt such behaviors. 2Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 3. SA-6 is a lightweight tool to quantify and compare security attitudes 3Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion ▪ Generally, I diligently follow a routine about security practices. ▪ I always pay attention to experts’ advice about the steps I need to take to keep my online data and accounts safe. ▪ I am extremely knowledgeable about all the steps needed to keep my online data and accounts safe. ▪ I am extremely motivated to take all the steps needed to keep my online data and accounts safe. ▪ I often am interested in articles about security threats. ▪ I seek out opportunities to learn about security measures that are relevant to me. On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following:
  • 4. 4Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion SA-6 may help to improve predictive modeling of security adoption Attitude toward security behavior Security behavior intention Security behavior SA-6 SeBIS Recalled actions Better predictive modeling = better targeting of interventions
  • 5. ▪ Much usability research employs in-depth interviews and observations. ▪ But this is not always feasible or desirable. 5Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Our field needs reliable and validated psychometric scales https://giphy.com/gifs/heyarnold-hey-arnold-nicksplat-xT1R9EbolF7trQnIyI
  • 6. Our field needs reliable and validated psychometric scales ▪ For large-scale, longitudinal or time-sensitive research, we need an online survey form that can be given with other scales or questionnaires. 6Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 7. ▪ Knowing users’ attitudes, intentions and behaviors helps us craft security tools that are: ▫ Useful ▫ Easy to use ▫ Satisfying to users 7 https://www.interaction-design.org/literature/topics/usability Our field needs reliable and validated psychometric scales Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 8. Our field needs reliable and validated psychometric scales ▪ An attitude scale helps answer research questions such as: ▫ How attentive to security advice is a certain user group likely to be? ▫ Does a new tool help or hurt a user’s attitude toward security compliance? 8Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 9. Current state of the art is SeBIS (Egelman & Peer 2015) ▪ 16-item self-report inventory in four areas: ▫ Password generation ▫ Proactive awareness ▫ Software updates ▫ Device securement But it has limitations: ▪ Specific to behavior intentions, not to attitudes. ▪ Tech-specific wording may become outdated. The Security Behavior Intentions Scale (SeBIS) isn’t enough 9Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 10. ▪ Theory of Reasoned Action ▫ Technology Acceptance Model ▫ Diffusion of Innovation Theory ▪ Elaboration Likelihood Model ▪ Self-Determination Theory ▪ Protection Motivation Theory An additional scale is needed to conduct theory-motivated research 10Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Behavior Intention Attitude Fishbein & Azjen 1967, 2010; Davis et al. 1989; Rogers 2010; Petty & Cacioppo 1980; Ryan & Deci 2000; Rogers 1975
  • 11. Best practice: Generate candidate items from prior work (Das et al. 2017) 11 Awareness Motivation Knowledge Security Sensitivity to engage in expert-recommended security practices Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Attitude
  • 12. ▪ A security breach, if one occurs, is not likely to cause significant harm to my online identity or accounts. ▪ Generally, I am aware of existing security threats. ▪ Generally, I am willing to spend money to use security measures that counteract the threats that are relevant to me. ▪ Generally, I care about security and privacy threats. ▪ Generally, I diligently follow a routine about security practices. ▪ Generally, I know how to figure out if an email was sent by a scam artist. ▪ Generally, I know how to use security measures to counteract the threats that are relevant to me. ▪ Generally, I know which security threats are relevant to me. Best practice: Test many different item variations for SA-6 (60+ to start) 12Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 13. ▪ SeBIS scale, 16 items ▪ Internet Know-How, 9 items ▪ Technical Know-How, 9 items ▪ Internet Users Information Privacy Concerns scale, 10 items ▪ Frequency of falling victim to a security breach, 2 items ▪ Amount heard or seen about security breaches, 1 item ▪ Barratt Impulsiveness Scale, 30 items ▪ Privacy Concerns Scale, 16 items ▪ Ten-Item Personality Inventory, 10 items ▪ General Self-Efficacy scale, 11 items ▪ Social Self-Efficacy scale, 5 items ▪ Confidence in Using Computers, 12 items Best practice: Collect measures theorized to relate with SA-6 13Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 14. 14 Best practice: Collect measures theorized to relate with SA-6 Test convergent validity ▪ RQ1a: Is SA-6 positively correlated with SeBIS? ▪ RQ1b: Do other measures thought to relate with security attitude correlate with SA-6? Test discriminant validity ▪ RQ2a: Does SA-6 vary with respect to background social factors (e.g. age, gender)? ▪ RQ2b: Does SA-6 vary with past experiences of security breaches? Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 15. Samples not significantly different by age [overall X^2(4, N=475)=11.42, p = n.s.] or gender [X^2(1, N = 475) =2.95, p = n.s.] Amazon Mechanical Turk sample 15 Best practice: Use a large, diverse sample for finalizing scale items Meets recommended ratio (5:1 to 10:1) of responses to scale items N = 475 University-run study pool sample Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 16. Best practice: Repeat study in a representative sample to validate scale 16 N = 209 Qualtrics-filled panel with age, gender & income tailored to U.S. population Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 17. 17 Best practice: Iterative analyses to zero in on the items for the scale Factor tests ▪ Exploratory Factor Analysis to check item correlations (SPSS) ▪ Reliability Analysis (alpha) to confirm internal consistency Model tests ▪ Confirmatory Factor Analysis to check goodness of fit (MPlus) ▪ Run several CFA models to make sure we specified the best model Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 18. SA-6 scale items (SPSS Principal Components Analysis) Factor loading I seek out opportunities to learn about security measures that are relevant to me. 0.81 I am extremely motivated to take all the steps needed to keep my online data and accounts safe. 0.78 Generally, I diligently follow a routine about security practices. 0.77 I often am interested in articles about security threats. 0.72 I always pay attention to experts' advice about the steps I need to take to keep my online data and accounts safe. 0.71 I am extremely knowledgeable about all the steps needed to keep my online data and accounts safe. 0.71 SA-6 demonstrates desired consistency + fit for a psychometric scale 18 ɑ=.84 CFI=.91 SRMR =.05
  • 19. SA-6 scale items (SPSS Principal Components Analysis) Factor loading I seek out opportunities to learn about security measures that are relevant to me. 0.81 I am extremely motivated to take all the steps needed to keep my online data and accounts safe. 0.78 Generally, I diligently follow a routine about security practices. 0.77 I often am interested in articles about security threats. 0.72 I always pay attention to experts' advice about the steps I need to take to keep my online data and accounts safe. 0.71 I am extremely knowledgeable about all the steps needed to keep my online data and accounts safe. 0.71 SA-6 = attentiveness to and engagement with cybersecurity measures 19
  • 20. 20 Best practice: Statistical testing of SA-6 as a valid attitude measure Factor tests ▪ Exploratory Factor Analysis to check item correlations (SPSS) ▪ Reliability Analysis (alpha) to confirm internal consistency Model tests ▪ Confirmatory Factor Analysis to check goodness of fit (MPlus) ▪ Run several CFA models to make sure we specified the best model Validity tests ▪ Test relationships + differences with other variables (SPSS) ▪ Also tested for ability to predict participants’ recalled security actions in past week Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 21. 21 Best practice: Test for expected associations with SA-6 Attitude toward security behavior Security behavior intention SA-6 SeBIS r=.540, p<.01 Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Faklaris et al. 2019 Egelman & Peer 2015 ▪ RQ1a: Is SA-6 positively correlated with SeBIS? ▪ Yes.
  • 22. 22 Best practice: Test for expected associations with SA-6 ▪ RQ1a: Is SA-6 positively correlated with SeBIS? ▪ Yes. Attitude toward security behavior Security behavior intention SA-6 SeBIS R2 =.280, p<.001 Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Faklaris et al. 2019 Egelman & Peer 2015
  • 23. 23 Best practice: Test for expected associations with SA-6 - With the Internet Users’ Informational Privacy Concerns (IUIPC) scale - With the Privacy Concerns Scale (PCS) r=.390, p<.01 r=.382, p<.01 Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Malhotra et al. 2004 Buchanan et al. 2007 ▪ RQ1b: Do other measures thought to relate with security attitude correlate with SA-6? ▪ Yes.
  • 24. 24 Best practice: Test for expected associations with SA-6 - With the Barratt Impulsiveness Scale - With the General Self-Efficacy scale - With the Social Self-Efficacy scale r=.180, p<.01 r=.208, p<.01 r=.363, p<.01 Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Stanford et al. 2009 (update) Zimmerman et al. 2000 Zimmerman et al. 2000 ▪ RQ1b: Do other measures thought to relate with security attitude correlate with SA-6? ▪ Yes.
  • 25. 25 Best practice: Test for expected associations with SA-6 ▪ RQ1b: Do other measures thought to relate with security attitude correlate with SA-6? ▪ Yes. - With the Kang Internet Know-How scale - w/Confidence in using computers - w/Web-oriented digital literacy r=.542, p<.01 r=.280, p<.05 r=.503, p<.05 Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Kang et al. 2015 Fogarty et al. 2001 (adapted) Hargittai 2005
  • 26. 26 Best practice: Test for expected differences in SA-6 by subgroup ▪ RQ2a: Does SA-6 vary with background factors? Yes. Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion SA-6 Mean (SD) t(df), p Age group 18-39 3.40 (.81) 40 + 3.69 (.76) t(207)= -2.172, p<.05 Gender Male 3.77 (.71) Female 3.53 (.81) t(198.38)= 2.19, p<.05
  • 27. 27 Best practice: Test for expected differences in SA-6 by subgroup Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion SA-6 Mean (SD) t(df), p College attendance No college 3.42 (.79) Attended college 3.73 (.76) t(207)=-2.76, p<.01 Income level Below $25K 3.30 (.71) Above $25K 3.73 (.77) t(207)=-3.42, p<.005 ▪ RQ2a: Does SA-6 vary with background factors? Yes.
  • 28. ▪ RQ2b: Does SA-6 vary with past breach experiences? Yes. SA-6 Mean (SD) t(df), p Low High Themselves falling victim to a security breach 3.56 (.78) 4.13 (.58) t(41.46) = -4.54, p<.001 Close friends or relatives falling victim 3.57 (.76) 4.10 (.74) t(207)= -3.40, p<.005 Heard about security breaches in the past year 3.35 (.80) 3.77 (.74) t(207)=-3.77, p<.001 28 Best practice: Test for expected differences in SA-6 by subgroup Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 29. Test support for predictive validity ▪ RQ3: Does a person’s SA-6 score positively associate with a measure of self-reported security behaviors within the past week? ▪ Collected 10 items based on SeBIS, 5-level agreement scale (RSec) 29 Best practice: Collect measures theorized to relate with SA-6 Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Ex: “In the past week, I have verified at least once that my antivirus software is up to date.”
  • 30. 30 Best practice: Test for SA-6’s influence on outcome variables Attitude toward security behavior Security behavior SA-6 RSec r=.398, p<.001 Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Faklaris et al. 2019 ▪ RQ3: Does SA-6 positively associate with a measure of self-reported security behaviors within the past week (RSec)? ▪ Yes. Faklaris et al. 2019
  • 31. 31 Best practice: Test for SA-6’s influence on outcome variables Attitude toward security behavior Security behavior intention Security behavior SA-6 SeBIS RSec Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Faklaris et al. 2019 Faklaris et al. 2019 Egelman & Peer 2015 R2 =.280, p<.001
  • 32. 32 Best practice: Test for SA-6’s influence on outcome variables Attitude toward security behavior Security behavior intention Security behavior SA-6 SeBIS RSec R2 =.235, p<.001 R2 =.280, p<.001 Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Faklaris et al. 2019 Faklaris et al. 2019 Egelman & Peer 2015
  • 33. 33 Best practice: Test for SA-6’s influence on outcome variables Attitude toward security behavior Security behavior intention Security behavior SA-6 SeBIS RSec R2 =.158, p<.001 Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion Faklaris et al. 2019 Faklaris et al. 2019 Egelman & Peer 2015 R2 =.235, p<.001 R2 =.280, p<.001
  • 34. 34Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion SA-6 can improve predictive modeling + targeting of interventions Attitude toward security behavior Security behavior intention Security behavior SA-6 SeBIS RSec Low SA-6 → boost awareness/motivation; High SA-6 → boost skill/ability Faklaris et al. 2019 Faklaris et al. 2019 Egelman & Peer 2015 R2 =.158, p<.001 R2 =.235, p<.001 R2 =.280, p<.001
  • 35. SA-6 can be helpful in your own usable security research ▪ Easily administer SA-6 via online survey form with other scales or questionnaires. ▪ Answer research questions such as ▫ How attentive to security advice is a certain user group likely to be? ▫ Does a new tool help or hurt a user’s attitude toward security compliance? 35Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion https://socialcybersecurity.org/sa6.html
  • 36. SA-6 can be helpful in your own usable security research ▪ Test hypotheses & models motivated by: ▫ Theory of Reasoned Action, ▫ Elaboration Likelihood Model, ▫ Self-Determination Theory, ▫ Protection Motivation Theory, ▫ Other theories and frameworks. 36Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion https://socialcybersecurity.org/sa6.html
  • 37. Take the Security Attitude quiz at SocialCybersecurity.org/sa6quiz 37Introduction | Study Motivation | Scale Development | Scale Validation | Conclusion
  • 38. Get the SA-6 scale & follow our work: ○ Twitter: @heycori | Email: heycori @cmu.edu ○ https://socialcybersecurity.org/sa6.html 38 Key takeaways 1. SA-6 is a lightweight tool to quantify and compare people’s attitudes toward using recommended security tools and practices. 2. SA-6 may help to improve predictive modeling of who will adopt such behaviors. Thank you to