TY - GEN
T1 - The myth of the average user
T2 - New Security Paradigms Workshop, NSPW 2015
AU - Egelman, Serge
AU - Peer, Eyal
N1 - Publisher Copyright: © 2015 ACM.
PY - 2015/9/8
Y1 - 2015/9/8
N2 - While individual differences in decision-making have been examined within the social sciences for several decades, they have only recently begun to be applied by computer scientists to examine privacy and security attitudes (and ultimately behaviors). Specifically, several researchers have shown how different online privacy decisions are correlated with the"Big Five"personality traits. In this paper, we show that the five factor model is actually a weak predictor of privacy attitudes, and that other well-studied individual differences in the psychology literature are much stronger predictors. Based on this result, we introduce the new paradigm of psychographic targeting of privacy and security mitiga- tions: we believe that the next frontier in privacy and security research will be to tailor mitigations to users' individual differences. We explore the extensive work on choice architecture and "nudges," and discuss the possible ways it could be leveraged to improve security outcomes by personalizing privacy and security mitigations to specific user traits.
AB - While individual differences in decision-making have been examined within the social sciences for several decades, they have only recently begun to be applied by computer scientists to examine privacy and security attitudes (and ultimately behaviors). Specifically, several researchers have shown how different online privacy decisions are correlated with the"Big Five"personality traits. In this paper, we show that the five factor model is actually a weak predictor of privacy attitudes, and that other well-studied individual differences in the psychology literature are much stronger predictors. Based on this result, we introduce the new paradigm of psychographic targeting of privacy and security mitiga- tions: we believe that the next frontier in privacy and security research will be to tailor mitigations to users' individual differences. We explore the extensive work on choice architecture and "nudges," and discuss the possible ways it could be leveraged to improve security outcomes by personalizing privacy and security mitigations to specific user traits.
UR - http://www.scopus.com/inward/record.url?scp=84959279309&partnerID=8YFLogxK
U2 - https://doi.org/10.1145/2841113.2841115
DO - https://doi.org/10.1145/2841113.2841115
M3 - منشور من مؤتمر
T3 - ACM International Conference Proceeding Series
SP - 16
EP - 28
BT - NSPW 2015 - Proceedings of the 2015 New Security Paradigms Workshop
Y2 - 8 September 2015 through 11 September 2015
ER -