ABSTRACT
Social influence is key in technology adoption, but its role in security-feature adoption is unique and remains unclear. Here, we analyzed how three Facebook security features' Login Approvals, Login Notifications, and Trusted Contacts-diffused through the social networks of 1.5 million people. Our results suggest that social influence affects one's likelihood to adopt a security feature, but its effect varies based on the observability of the feature, the current feature adoption rate among a potential adopter's friends, and the number of distinct social circles from which those feature-adopting friends originate. Curiously, there may be a threshold higher than which having more security feature adopting friends predicts for higher adoption likelihood, but below which having more feature-adopting friends predicts for lower adoption likelihood. Furthermore, the magnitude of this threshold is modulated by the attributes of a feature-features that are more noticeable (Login Approvals, Trusted Contacts) have lower thresholds.
- Adams, A. and Sasse, M.A. Users are not the enemy. CACM 42, 12 (1999), 40--46. Google ScholarDigital Library
- Aral, S., Muchnik, L., and Sundararajan, A. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. PNAS 106, 51 (2009), 21544--9.Google ScholarCross Ref
- Bakshy, E., Rosenn, I., Marlow, C., and Adamic, L. The role of social networks in information diffusion. Proc. WWW '12, ACM Press (2012), 519--528. Google ScholarDigital Library
- Bandura, A., Grusec, J.E., and Menlove, F.L. Vicarious Extinction of Avoidance Behavior. Journal of Personality and Social Psychology 5, 1 (1967), 16--23.Google ScholarCross Ref
- Bond, R.M., Fariss, C.J., Jones, J.J., et al. A 61million-person experiment in social influence and political mobilization. Nature 489, 7415 (2012), 295--8.Google ScholarCross Ref
- Centola, D., Macy, M., and Macy, M. Complex Contagion and the Weakness of Long Ties. American journal of Sociology 113, 3 (2014), 702--734.Google Scholar
- Centola, D. The spread of behavior in an online social network experiment. Science (New York, N.Y.) 329, 5996 (2010), 1194--7.Google ScholarCross Ref
- Centola, D. An experimental study of homophily in the adoption of health behavior. Science 334, 6060 (2011).Google ScholarCross Ref
- Chapman, L.J. Illusory correlation in observational report. Journal of Verbal Learning and Verbal Behavior 6, 1 (1967), 151--155.Google ScholarCross Ref
- Cialdini, R.B. Influence. Harper Collins, 2009.Google Scholar
- Das, S., Kim, H.J., Dabbish, L.A., and Hong, J.I. The Effect of Social Influence on Security Sensitivity. Proc. SOUPS'14, (2014).Google Scholar
- Fowler, J.H. and Christakis, N. a. Cooperative behavior cascades in human social networks. PNAS 107, 12 (2010), 5334--8.Google ScholarCross Ref
- Gaw, S., Felten, E.W., and Fernandez-Kelly, P. Secrecy, flagging, and paranoia. Proc. CHI '06, ACM Press (2006), 591--600. Google ScholarDigital Library
- Goldstein, N.J., Cialdini, R.B., and Griskevicius, V. A Room with a Viewpoint: Using Social Norms to Motivate Environmental Conservation in Hotels. Journal of Consumer Research 35, 3 (2008), 472--482.Google ScholarCross Ref
- Herley, C. So long, and no thanks for the externalities. Proc. NSPW '09, ACM Press (2009), 133--144. Google ScholarDigital Library
- Johnson, R.C. Cyber security solutions underused. EE Times, 2013. http://www.eetimes.com/author.asp?section_id=36&do c_id=1287251&page_number=1.Google Scholar
- Kramer, A.D.I. The spread of emotion via facebook. Proc. CHI '12, ACM Press (2012), 767--770. Google ScholarDigital Library
- Milgram, S., Bickman, L., and Berkowitz, L. Note on the drawing power of crowds of different size. JPSP 13, 2 (1969), 79--82.Google ScholarCross Ref
- Moore, H. and Roberts, D. AP Twitter hack causes panic on Wall Street and sends Dow plunging. The Guardian, 2013. http://www.theguardian.com/business/2013/apr/23/aptweet-hack-wall-street-freefall.Google Scholar
- Rader, E., Wash, R., and Brooks, B. Stories as informal lessons about security. Proc. SOUPS '12, ACM Press. Google ScholarDigital Library
- Rogers, E.M. Diffusion of Innovations. Free Press, 2003.Google Scholar
- Romero, D.M., Meeder, B., and Kleinberg, J. Differences in the mechanics of information diffusion across topics. Proc. WWW '11, ACM Press (2011). Google ScholarDigital Library
- Rosenbaum, P.R. and Rubin, D.B. The Central Role of the Propensity Score in Observational Studies for Causal Effects. Biometrika 70, 1 (1983), 41--55.Google ScholarCross Ref
- Sasse, M.A. Computer security: Anatomy of a Usability Disaster, and a Plan for Recovery. Proc. CHI '03 Wkshp on HCI and Security Systems.Google Scholar
- Schultz, P.W., Nolan, J.M., Cialdini, R.B., Goldstein, N.J., and Griskevicius, V. The constructive, destructive, and reconstructive power of social norms. Psychological science 18, 5 (2007), 429--34.Google Scholar
- Shalizi, C.R. and Thomas, A.C. Homophily and Contagion Are Generically Confounded in Observational Social Network Studies. Sociological Methods and Research 40, 2 (2011), 211--239.Google ScholarCross Ref
- Sun, E., Rosenn, I., Marlow, C.A., and Lento, T.M. Gesundheit! Modeling Contagion through Facebook News Feed. Proc. ICWSM '09, (2009).Google Scholar
- Tversky, A. and Kahneman, D. Availability?: A Heuristic for Judging Frequency. Cog. Psych. 5, 2 (1973), 207--232.Google Scholar
- Ugander, J., Backstrom, L., Marlow, C., and Kleinberg, J. Structural diversity in social contagion. PNAS 109, 16 (2012), 5962--6.Google ScholarCross Ref
- Wyler, G. AP Twitter Hacked, Claims Barack Obama Injured In White House Explosions. Business Insider, 2013. http://www.businessinsider.com/ap-hackedobama-injured-white-house-explosions-2013--4.Google Scholar
Index Terms
- The Role of Social Influence in Security Feature Adoption
Recommendations
Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityOne of the largest outstanding problems in computer security is the need for higher awareness and use of available security tools. One promising but largely unexplored approach is to use social proof: by showing people that their friends use security ...
Does Life Satisfaction influence the intention (We-Intention) to use Facebook?
We evaluated Life Satisfaction and three factors of social influence.Life Satisfaction improves the effects of social influence factors.Results reinforce that psychological needs motivate human behavior.The psychological needs are more important than ...
Online social networks: Why do students use facebook?
The growth and popularity of online social networks has created a new world of collaboration and communication. More than a billion individuals around the world are connected and networked together to create, collaborate, and contribute their knowledge ...
Comments