SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors (2404.10187v1)
Abstract: Researchers are increasingly exploring how gender, culture, and other sociodemographic factors correlate with user computer security and privacy behaviors. To more holistically understand relationships between these factors and behaviors, we make two contributions. First, we broadly survey existing scholarship on sociodemographics and secure behavior (151 papers) before conducting a focused literature review of 47 papers to synthesize what is currently known and identify open questions for future research. Second, by incorporating contemporary social and critical theories, we establish guidelines for future studies of sociodemographic factors and security behaviors that address how to overcome common pitfalls. We present a case study to demonstrate our guidelines in action, at-scale, that conduct a measurement study of the relationships between sociodemographics and de-identified, aggregated log data of security and privacy behaviors among 16,829 users on Facebook across 16 countries. Through these contributions, we position our work as a systemization of a lack of knowledge (SoLK). Overall, we find contradictory results and vast unknowns about how identity shapes security behavior. Through our guidelines and discussion, we chart new directions to more deeply examine how and why sociodemographic factors affect security behaviors.
- R. Bivens. The gender binary will not be deprogrammed: Ten years of coding gender on Facebook. New Media & Society, 2017.
- Exploring decision making with Android’s runtime permission dialogs using in-context surveys. In Proc. SOUPS, 2017.
- J. Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords. In Proc. IEEE S&P, 2012.
- A US-UK Usability Evaluation of Consent Management Platform Cookie Consent Interface Design on Desktop and Mobile. In Proc. CHI, 2023.
- Sorting Things Out: Classification and its Consequences. MIT Press, 2000.
- Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice. In Proc. SOUPS.
- Exploring Internet Security Perceptions and Practices in Urban Ghana. In SOUPS, 2014.
- Multiple password interference in text passwords and click-based graphical passwords. In Proc. CCS, 2009.
- H. Cho and A. Filippova. Networked Privacy Management in Facebook: A Mixed-Methods and Multinational Study. In Proc. CSCW, 2016.
- HARK No More: On the Preregistration of CHI Experiments. In Proc. CHI, 2018.
- P. H. Collins. Fighting Words: Black Women & The Search for Justice. Uniersity of Minnesota Press, 1998.
- K. P. Coopamootoo. Usage patterns of privacy-enhancing technologies. In Proc. CCS, 2020.
- "I feel invaded, annoyed, anxious and I may protect myself": Individuals’ Feelings about Online Tracking and their Protective Behaviour across Gender and Country. In Proc. USENIX Security, 2022.
- S. Costanza-Chock. Design Justice: Community-Led Practices to Build the Worlds We Need. MIT Press, 2020.
- Best Practices in Longitudinal Research. In CHI Extended Abstracts, 2009.
- K. W. Crenshaw. On intersectionality: Essential writings. The New Press, 2017.
- S. Cunningham. Causal inference: The mixtape. Yale University Press, 2021.
- A Typology of Perceived Triggers for End-User Security and Privacy Behaviors. In Proc. SOUPS, 2019.
- Breaking! A Typology of Security and Privacy News and How It’s Shared. In Proc. CHI, 2018.
- Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations. In Proc. SOUPS, 2020.
- Why Phishing Works. In Proc. CHI, 2006.
- A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research. ACM Transactions on Computer-Human Interaction (TOCHI), 2021.
- The pypdf library.
- What (or Who) Is Public? Privacy Settings and Social Media Content Sharing. In Proc. CSCW, 2017.
- "Like Lesbians Walking the Perimeter": Experiences of US LGBTQ+ Folks With Online Security, Safety, and Privacy Advice. In Proc. USENIX Security, 2022.
- J. Gerken. Longitudinal Research in Human-Computer Interaction. PhD thesis, Universität Konstanz, 2011.
- The network in the garden: an empirical analysis of social media in rural life. In Proc. CHI, 2008.
- Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns. In Proc. USENIX Security, 2021.
- Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing. In Proc. SOUPS, 2018.
- Impact of Contextual Factors on Snapchat Public Sharing. In Proc. CHI, 2019.
- Keep on Lockin’ in the Free World: A Multi-National Comparison of Smartphone Locking. In Proc. CHI, 2016.
- E. Hargittai and Y. P. Hsieh. Succinct survey measures of web-use skills. Social Science Computer Review, 30(1):95–107, 2012.
- E. Hargittai and E. Litt. New Strategies for Employment? Internet Skills and Online Privacy Practices during People’s Job Search. IEEE Security & Privacy, 11(3):38–45, 2013.
- Your Photo is so Funny that I don’t Mind Violating Your Privacy by Sharing it: Effects of Individual Humor Styles on Online Photo-sharing Behaviors. In Proc. CHI, 2021.
- A Survey on the Geographic Diversity of Usable Privacy and Security Research. arXiv, 2023.
- Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails. In Proc. SOUPS, 2021.
- C. Herley. More is not the answer. IEEE Security and Privacy, January 2014.
- P. Hitlin. Research in the Crowdsourcing Age, a Case Study. Technical report, Pew Research Center, July 2016.
- A. L. Hoffmann. Terms of inclusion: Data, discourse, violence. New Media & Society, 2021.
- H. D. Horton. Critical demography: The paradigm of the future? In Sociological Forum, 1999.
- Viewing the Viewers: Publishers’ Desires and Viewers’ Privacy Concerns in Social Networks. In Proc. CSCW, 2017.
- “…No one Can Hack My Mind”: Comparing Expert and Non-Expert Security Practices. In SOUPS. USENIX Association, 2015.
- Risk-taking as a Learning Process for Shaping Teen’s Online Information Privacy Behaviors. In Proc. CSCW, 2015.
- The Expanding Focus of HCI: Case Culture. In Proc. NordiCHI, 2006.
- Privacy, Patriarchy, and Participation on Social Media. In Proc. DIS, 2019.
- Human factors in security research: Lessons learned from 2008-2018.
- J. J. Kaye. Self-reported password sharing strategies. In Proc. CHI, 2011.
- O. Keyes. The Misgendering Machines: Trans/HCI Implications of Automatic Gender Recognition. CSCW, 2018.
- You Keep Using That Word: Ways of Thinking about Gender in Computing Research. CSCW, 2021.
- I. Krumpal. Determinants of social desirability bias in sensitive surveys: a literature review. Quality & quantity, 47(4):2025–2047, 2013.
- J. Kruschke. Doing Bayesian data analysis: A tutorial with R, JAGS, and Stan. Academic Press, 2014.
- School of Phish: A Real-World Evaluation of Anti-Phishing Training. In Proc. SOUPS, 2009.
- Research Methods in Human-Computer Interaction. Morgan Kaufmann, 2017.
- Embracing Four Tensions in Human-Computer Interaction Research with Marginalized People. TOCHI, 28(2), 2021.
- How WEIRD is CHI? In Proc. CHI, 2021.
- Webcam Covering as Planned Behavior. In Proc. CHI, 2018.
- M. Madden. Privacy management on social media sites. Pew Internet Report, 24:1–20, 2012.
- M. Madden. Privacy, security, and digital inequality, 2017.
- A. Mathur and M. Chetty. Impact of User Characteristics on Attitudes Towards Automatic Mobile Application Updates. In Proc. SOUPS, 2017.
- Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking. In Proc. SOUPS, 2018.
- Is psychology suffering from a replication crisis? what does “failure to replicate” really mean? American Psychologist, 70(6):487, 2015.
- Measuring Password Guessability for an Entire University. In Proc. CCS, 2013.
- K. S. McClure. Selecting and Describing Your Research Instruments, chapter Identifying and defining the constructs and variables to measure. American Psychological Association, 2020.
- “It’s stressful having all these phones”: Investigating Sex Workers’ Safety Goals, Risks, and Practices Online. In Proc. USENIX Security, 2021.
- Investigating the Computer Security Practices and Needs of Journalists. In Proc. USENIX Security, 2015.
- “I just stopped using one and started using the other”: Motivations, Techniques, and Challenges When Switching Password Managers. In Proc. CCS, 2023.
- A. J. Nederhof. Methods of coping with social desirability bias: A review. European Journal of Social Psychology, 15(3):263–280, 1985.
- E. B. of the American Anthropological Association. AAA Statement on Race.
- A Decade of Demographics in Computing Education Research: A Critical Review of Trends in Collection, Reporting, and Use. In Proc. ICER, 2022.
- K. Olmstead and A. Smith. What the public knows about cybersecurity. Pew Research Center, 22, 2017.
- Insights into User Behavior in Dealing with Internet Attacks. In NDSS, 2012.
- M. T. Orne. On the social psychology of the psychological experiment: With particular reference to demand characteristics and their implications. American psychologist, 17(11):776, 1962.
- A. A. C. Ortega. Toward critical demography 2.0. Human Geography, 2023.
- Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships. In Proc. SOUPS, 2018.
- J. Pearl. Causal inference in statistics: An overview. Statistics Surveys, 2009.
- Causal inference in statistics: A primer. John Wiley & Sons, 2016.
- Let’s Go in for a Closer Look: Observing Passwords in Their Natural Habitat. In CCS, CCS, pages 295–310, New York, NY, USA, 2017. Association for Computing Machinery. event-place: Dallas, Texas, USA.
- Why people (don’t) use password managers effectively. In SOUPS, 2019.
- D. L. Poston, editor. Handbook of population. Springer, 2nd edition, 2019.
- Demography: measuring and modeling population processes. Blackwell, 2001.
- H. C. Purchase. Experimental human-computer interaction: a practical guide with visual examples. Cambridge University Press, 2012.
- E. M. Redmiles. Net Benefits: Digital Inequities in Social Capital, Privacy Preservation, and Digital Parenting Practices of US Social Media Users. In AAAI, 2018.
- A summary of survey methodology best practices for security and privacy researchers. 2017.
- Power in Computer Security and Privacy: A Critical Lens. IEEE Security & Privacy, March/April 2023.
- “I just want to feel safe”: A Diary Study of Safety Perceptions on Social Media. In Proc. ICWSM, 2019.
- Examining the Demand for Spam: Who Clicks? In Proc. CHI, 2018.
- How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior. In Proc. CCS, 2016.
- Where is the Digital Divide? A Survey of Security, Privacy, and Socioeconomics. In Proc. CHI, 2017.
- A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. In Proc. USENIX Security, 2020.
- A. Saini. Superior: The Return of Race Science. Penguin Random House, 2019.
- The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278–1308, 1975.
- “Privacy is not for me, it’s for those rich women”: Performative Privacy Practices on Mobile Phones by Women in South Asia. In Proc. SOUPS, 2018.
- S. Sannon and A. Forte. Privacy Research with Marginalized Groups: What We Know, What’s Needed, and What’s Next. CSCW, 2022.
- HCI Gender Guidelines, 2020.
- How We’ve Taught Algorithms to See Identity: Constructing Race and Gender in Image Databases for Facial Analysis. CSCW, 2020.
- Intersectional HCI: Engaging identity through gender, race, and class. In Proc. CHI, 2017.
- J. C. Scott. Seeing like a State: How Certain Schemes to Improve the Human Condition Have Failed. Yale University Press, 2020.
- Predicting Impending Exposure to Malicious Content from User Behavior. In Proc. CCS, 2018.
- Encountering Stronger Password Requirements: User Attitudes and Behaviors. In Proc. SOUPS, 2010.
- Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions. In Proc. CHI, 2010.
- Anti-Phishing Phil: The design and evaluation of a game that teaches people not to fall for phish. In ACM International Conference Proceeding Series, volume 229, pages 88–99, 2007.
- Psychology, Science, and Knowledge Construction: Broadening Perspectives from the Replication Crisis. Annual Review of Psychology, 69:487–510, 2018.
- W. Sigle. Demography’s theory and approach: (How) has the view from the margins changed? Population Studies, 75(sup1):235–251, 2021.
- Computer Security and Privacy for Refugees in the United States. In Proc. IEEE S&P, 2018.
- A. Smedley and B. D. Smedley. Race as biology is fiction, racism as a social problem is real: Anthropological and historical perspectives on the social construction of race. American Psychologist, 60(1):16, 2005.
- On the Challenges in Usable Security Lab Studies: Lessons Learned from Replicating a Study on SSL Warnings. In Proc. SOUPS, 2011.
- F. Stutzman and J. Kramer-Duffield. Friends Only: Examining a Privacy-Enhancing Behavior in Facebook. In Proc. CHI, 2010.
- M. I. Suárez and P. Slattery. Resisting erasure: Transgender, gender nonconforming, and nonbinary issues in curriculum studies. Journal of Curriculum and Pedagogy, 15(3):259–262, 2018.
- R. Sáenz and M. C. Morales. Handbook of Population, chapter Demography of Race and Ethnicity. Springer, 2nd edition, 2019.
- “It’s common and a part of being a content creator”: Understanding How Creators Experience and Cope with Hate and Harassment Online. In Proc. CHI, 2022.
- S. Tifferet. Gender differences in privacy tendencies on social network sites: A meta-analysis. Computers in Human Behavior, 93:1–12, 2019.
- Care Infrastructures for Digital Security in Intimate Partner Violence. In Proc. CHI, 2022.
- Structural equation modeling. Handbook of Psychology, Second Edition, 2, 2012.
- S. United Nations Educational and C. Organization. International Standard Classification of Education (ISCED) 2021.
- Modifying Smartphone User Locking Behavior. In Proc. SOUPS, 2013.
- VAWnet. Violence against trans and non-binary people.
- SoK: A Framework for Unifying At-Risk User Research. In Proc. IEEE S&P, 2022.
- R. Wash and E. Rader. Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users. In SOUPS, 2015.
- Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy. In Proc. IEEE S&P, 2023.
- A. Whitten and J. D. Tygar. Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In USENIX Security, 1999.
- Infrastructuring Care: How Trans and Non-Binary People Meet Health and Well-Being Needs through Technology. In Proc. CHI, 2023.
- Gender roles, computer attitudes, and dyadic computer interaction performance in college students. Sex Roles, 29(7):515, 1993.
- H. Wimberly and L. M. Liebrock. Using fingerprint authentication to reduce system security: An empirical study. IEEE Security & Privacy, 2011.
- Research Contributions in Human-Computer Interaction. Interactions, 23(3):38–44, 2016.
- Distress Disclosure across Social Media Platforms during the COVID-19 Pandemic: Untangling the Effects of Platforms, Affordances, and Audiences. In Proc. CHI, 2021.
- Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices. In Proc. CHI, 2020.
- Miranda Wei (5 papers)
- Jaron Mink (2 papers)
- Yael Eiger (2 papers)
- Tadayoshi Kohno (32 papers)
- Elissa M. Redmiles (24 papers)
- Franziska Roesner (23 papers)