SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
ta
User Study
PopJART:
• Designed research proto-
type tool that identifies
attack websites with high
probability
• PopJART is an example
security software that
helps identify malicious
websites.
• Designing user interface
routine to enhance risk
awareness and self-
efficacy .
Interview:
• In Part 1, participants
answered self-efficacy
and perceived risk
questions.
• In Part 2, participants
viewed 8 websites and
guessed whether those
websites were safe or
malicious and what
criteria they used to make
the decision.
• In Part 3, PopJART was
explained and they
revisited the websites.
After participants
answered PopJART
adoption questions.
http://www.flickr.com/photos/mookies/90547700/lightbo
x/
http://www.oprah.com/health/Your-Questions-
Answered/5
Communicating Risk in
Internet Security and
Privacy (CRISP)
Health Benefit Model (HBM):
In this model, a target
population’s likelihood to change
their behavior is based on:
• perceived susceptibility
(perception of risk)
• perceived severity
• perceived benefits
• perceived barriers (cues to
action)
• self-efficacy
Security software interfaces
should lead to behavior change.
Why a Marginalized
Community?:
• Understanding the challenges
in designing the user
interfaces of security software
• Targeting populations with
• low-proficiency
• limited access to
computers and the
internet
• socio-economic
hardship.
Participants:
• Advertised in a public
computer lab run by a non-
profit organization in a low-
income neighborhood in SF.
• Most of lab users live on social
security and have low
computer proficiency.
Security software
adoption
Attacks on the Internet are highly
sophisticated and hard for an
average user to identify. Using
security software is strongly
recommended.
How perceived risk and self-efficacy affect users’
behavior regarding Internet security
“I’m extremely confident that I
don’t know [how often I visit
malicious websites].” Low self-
efficacy affects perceived risk.
80% of those who thought they
could differentiate safe and
malicious websites said they
would adopt PopJART.
• Better self-efficacy may
encourage security software
adoption.
77% of those
who thought
malicious
websites could
cause harm just
by visiting said
they would
adopt PopJART.
Healthy User
Behavior
regarding
Internet Security
Perceived risk
How susceptible I am to attacks
on the Internet? The higher it is,
the user is more likely to take
cautions.
Self-efficacy
Am I competent to behave
properly when I visit a
malicious website? The higher
self-efficacy is, the better.
EJ Jung, Evelyn Y. Ho & Mark Sinclair
University of San Francisco
Hyewon Chung
Chungnam National University
Ongoing research with USF Undergraduates
In our investigation we are observing a lower adoption rate. We hypothesize that
participants with high self-efficacy and low perceived risk might be less likely to adopt
the software.
Perceived Risk and Self-Efficacy Regarding Internet
Security in a Marginalized Community

Contenu connexe

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

CHI Poster draft for CARD 2015 03 30

  • 1. ta User Study PopJART: • Designed research proto- type tool that identifies attack websites with high probability • PopJART is an example security software that helps identify malicious websites. • Designing user interface routine to enhance risk awareness and self- efficacy . Interview: • In Part 1, participants answered self-efficacy and perceived risk questions. • In Part 2, participants viewed 8 websites and guessed whether those websites were safe or malicious and what criteria they used to make the decision. • In Part 3, PopJART was explained and they revisited the websites. After participants answered PopJART adoption questions. http://www.flickr.com/photos/mookies/90547700/lightbo x/ http://www.oprah.com/health/Your-Questions- Answered/5 Communicating Risk in Internet Security and Privacy (CRISP) Health Benefit Model (HBM): In this model, a target population’s likelihood to change their behavior is based on: • perceived susceptibility (perception of risk) • perceived severity • perceived benefits • perceived barriers (cues to action) • self-efficacy Security software interfaces should lead to behavior change. Why a Marginalized Community?: • Understanding the challenges in designing the user interfaces of security software • Targeting populations with • low-proficiency • limited access to computers and the internet • socio-economic hardship. Participants: • Advertised in a public computer lab run by a non- profit organization in a low- income neighborhood in SF. • Most of lab users live on social security and have low computer proficiency. Security software adoption Attacks on the Internet are highly sophisticated and hard for an average user to identify. Using security software is strongly recommended. How perceived risk and self-efficacy affect users’ behavior regarding Internet security “I’m extremely confident that I don’t know [how often I visit malicious websites].” Low self- efficacy affects perceived risk. 80% of those who thought they could differentiate safe and malicious websites said they would adopt PopJART. • Better self-efficacy may encourage security software adoption. 77% of those who thought malicious websites could cause harm just by visiting said they would adopt PopJART. Healthy User Behavior regarding Internet Security Perceived risk How susceptible I am to attacks on the Internet? The higher it is, the user is more likely to take cautions. Self-efficacy Am I competent to behave properly when I visit a malicious website? The higher self-efficacy is, the better. EJ Jung, Evelyn Y. Ho & Mark Sinclair University of San Francisco Hyewon Chung Chungnam National University Ongoing research with USF Undergraduates In our investigation we are observing a lower adoption rate. We hypothesize that participants with high self-efficacy and low perceived risk might be less likely to adopt the software. Perceived Risk and Self-Efficacy Regarding Internet Security in a Marginalized Community