skip to main content
10.1145/2675133.2675225acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

The Role of Social Influence in Security Feature Adoption

Published:28 February 2015Publication History

ABSTRACT

Social influence is key in technology adoption, but its role in security-feature adoption is unique and remains unclear. Here, we analyzed how three Facebook security features' Login Approvals, Login Notifications, and Trusted Contacts-diffused through the social networks of 1.5 million people. Our results suggest that social influence affects one's likelihood to adopt a security feature, but its effect varies based on the observability of the feature, the current feature adoption rate among a potential adopter's friends, and the number of distinct social circles from which those feature-adopting friends originate. Curiously, there may be a threshold higher than which having more security feature adopting friends predicts for higher adoption likelihood, but below which having more feature-adopting friends predicts for lower adoption likelihood. Furthermore, the magnitude of this threshold is modulated by the attributes of a feature-features that are more noticeable (Login Approvals, Trusted Contacts) have lower thresholds.

References

  1. Adams, A. and Sasse, M.A. Users are not the enemy. CACM 42, 12 (1999), 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Aral, S., Muchnik, L., and Sundararajan, A. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. PNAS 106, 51 (2009), 21544--9.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bakshy, E., Rosenn, I., Marlow, C., and Adamic, L. The role of social networks in information diffusion. Proc. WWW '12, ACM Press (2012), 519--528. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bandura, A., Grusec, J.E., and Menlove, F.L. Vicarious Extinction of Avoidance Behavior. Journal of Personality and Social Psychology 5, 1 (1967), 16--23.Google ScholarGoogle ScholarCross RefCross Ref
  5. Bond, R.M., Fariss, C.J., Jones, J.J., et al. A 61million-person experiment in social influence and political mobilization. Nature 489, 7415 (2012), 295--8.Google ScholarGoogle ScholarCross RefCross Ref
  6. Centola, D., Macy, M., and Macy, M. Complex Contagion and the Weakness of Long Ties. American journal of Sociology 113, 3 (2014), 702--734.Google ScholarGoogle Scholar
  7. Centola, D. The spread of behavior in an online social network experiment. Science (New York, N.Y.) 329, 5996 (2010), 1194--7.Google ScholarGoogle ScholarCross RefCross Ref
  8. Centola, D. An experimental study of homophily in the adoption of health behavior. Science 334, 6060 (2011).Google ScholarGoogle ScholarCross RefCross Ref
  9. Chapman, L.J. Illusory correlation in observational report. Journal of Verbal Learning and Verbal Behavior 6, 1 (1967), 151--155.Google ScholarGoogle ScholarCross RefCross Ref
  10. Cialdini, R.B. Influence. Harper Collins, 2009.Google ScholarGoogle Scholar
  11. Das, S., Kim, H.J., Dabbish, L.A., and Hong, J.I. The Effect of Social Influence on Security Sensitivity. Proc. SOUPS'14, (2014).Google ScholarGoogle Scholar
  12. Fowler, J.H. and Christakis, N. a. Cooperative behavior cascades in human social networks. PNAS 107, 12 (2010), 5334--8.Google ScholarGoogle ScholarCross RefCross Ref
  13. Gaw, S., Felten, E.W., and Fernandez-Kelly, P. Secrecy, flagging, and paranoia. Proc. CHI '06, ACM Press (2006), 591--600. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Goldstein, N.J., Cialdini, R.B., and Griskevicius, V. A Room with a Viewpoint: Using Social Norms to Motivate Environmental Conservation in Hotels. Journal of Consumer Research 35, 3 (2008), 472--482.Google ScholarGoogle ScholarCross RefCross Ref
  15. Herley, C. So long, and no thanks for the externalities. Proc. NSPW '09, ACM Press (2009), 133--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Johnson, R.C. Cyber security solutions underused. EE Times, 2013. http://www.eetimes.com/author.asp?section_id=36&do c_id=1287251&page_number=1.Google ScholarGoogle Scholar
  17. Kramer, A.D.I. The spread of emotion via facebook. Proc. CHI '12, ACM Press (2012), 767--770. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Milgram, S., Bickman, L., and Berkowitz, L. Note on the drawing power of crowds of different size. JPSP 13, 2 (1969), 79--82.Google ScholarGoogle ScholarCross RefCross Ref
  19. Moore, H. and Roberts, D. AP Twitter hack causes panic on Wall Street and sends Dow plunging. The Guardian, 2013. http://www.theguardian.com/business/2013/apr/23/aptweet-hack-wall-street-freefall.Google ScholarGoogle Scholar
  20. Rader, E., Wash, R., and Brooks, B. Stories as informal lessons about security. Proc. SOUPS '12, ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Rogers, E.M. Diffusion of Innovations. Free Press, 2003.Google ScholarGoogle Scholar
  22. Romero, D.M., Meeder, B., and Kleinberg, J. Differences in the mechanics of information diffusion across topics. Proc. WWW '11, ACM Press (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Rosenbaum, P.R. and Rubin, D.B. The Central Role of the Propensity Score in Observational Studies for Causal Effects. Biometrika 70, 1 (1983), 41--55.Google ScholarGoogle ScholarCross RefCross Ref
  24. Sasse, M.A. Computer security: Anatomy of a Usability Disaster, and a Plan for Recovery. Proc. CHI '03 Wkshp on HCI and Security Systems.Google ScholarGoogle Scholar
  25. Schultz, P.W., Nolan, J.M., Cialdini, R.B., Goldstein, N.J., and Griskevicius, V. The constructive, destructive, and reconstructive power of social norms. Psychological science 18, 5 (2007), 429--34.Google ScholarGoogle Scholar
  26. Shalizi, C.R. and Thomas, A.C. Homophily and Contagion Are Generically Confounded in Observational Social Network Studies. Sociological Methods and Research 40, 2 (2011), 211--239.Google ScholarGoogle ScholarCross RefCross Ref
  27. Sun, E., Rosenn, I., Marlow, C.A., and Lento, T.M. Gesundheit! Modeling Contagion through Facebook News Feed. Proc. ICWSM '09, (2009).Google ScholarGoogle Scholar
  28. Tversky, A. and Kahneman, D. Availability?: A Heuristic for Judging Frequency. Cog. Psych. 5, 2 (1973), 207--232.Google ScholarGoogle Scholar
  29. Ugander, J., Backstrom, L., Marlow, C., and Kleinberg, J. Structural diversity in social contagion. PNAS 109, 16 (2012), 5962--6.Google ScholarGoogle ScholarCross RefCross Ref
  30. Wyler, G. AP Twitter Hacked, Claims Barack Obama Injured In White House Explosions. Business Insider, 2013. http://www.businessinsider.com/ap-hackedobama-injured-white-house-explosions-2013--4.Google ScholarGoogle Scholar

Index Terms

  1. The Role of Social Influence in Security Feature Adoption

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CSCW '15: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing
      February 2015
      1956 pages
      ISBN:9781450329224
      DOI:10.1145/2675133

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 February 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CSCW '15 Paper Acceptance Rate161of575submissions,28%Overall Acceptance Rate2,235of8,521submissions,26%

      Upcoming Conference

      CSCW '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader