Clicking the print icon in the upper right will concatinate all the Lecture pages onto one page.
Lecture pages are designed around self study. They include required readings, points you should understand from the lecture, and one or more questions you can think about. Some lectures contain lecture note text. They also include links to additional materials if you find the topic intersting. As well as links to news articles and other materials referred to in the lecture.
Usable Security and Privacy is a field that looks at how people currently use security and privacy technologies as well as how to make those technologies more usable. USEC touches on many topic areas including: Human-Computer Interaction, Cybersecurity, Privacy, Law, Public Policy, Psychology, and Social Science.
Security and privacy tools that cannot be used are, well, useless. In fact they can be worse than useless because people will work very hard to circumvent the “annoying” technology potentially putting themselves in more danger.
What does “secure advertising” mean to you?
s/hlr4&id=206&men_tab=srchresults))
The next time you run into an uncomfortable social situation that involves privacy, try and think back on this lecture to tease out what about the situation made you uncomfortable.
Daniel J. Solove. “The Limitations of Privacy Rights”. 98 Notre Dame Law Review 975 (2023), GWU Legal Studies Research Paper No. 2022-30, GWU Law School Public Law Research Paper No. 2022-30
Think about a security or privacy technology that you often use and claims to be encrypted. How might you run a study like the Johnny paper on that technology and how would you expect the results to be the same or different?
Compare Telegram and Signal in terms of communication security.
Lecture Notes
Why Johnny Can’t Encrypt is one of the most famous studies in Usable Privacy and Security. It showed that even PhD students at Carnegie Mellon University could not accurately send and receive encrypted email messages without making very serious errors.
Critique a study in terms of limitations and strengths
Apply
Select a research paper, read through the methodology section, note down what you think the limitations are. Then read through the limitations section and compare your notes against what the authors wrote.
Try understanding the basic statistics. Anything about models or GLMMs can be skimmed.
Learning Outcomes
Understand
Research questions guide survey design.
Wording can have a large impact on answers.
How to apply study design lessons to surveys.
Apply
Take a survey and pay attention to the questions you are being asked. Are any of them leading? Do they accurately allow you to express your skills or opinions?
Most in-store receipts have links to take a survey
Phone surveys sometimes happen
If you call a service center you may be asked to take a survey
Fill out a product review, it normally includes a mini survey
Lecture Notes: Survey Scales
Survey Scales about Security and Privacy
Writing good survey questions requires careful thought and a good knowledge of the information you are trying to measure. Some concepts are also challenging to measure like “security attitude”. To solve this problem, research teams create what are known as “survey scales”. A scale is a set of questions that are well written and have been shown to reliably measure a concept.
Scales have several useful properties. First off, writing good survey questions is challenging, so a pre-written scale is just easier to use. Secondly, if multiple researchers all ask the exact same questions, it becomes possible to compare answers across research studies. Finally, researchers using a scale can assume (and cite) that it reliably measures a concept.
Below are four scales from usable privacy and security. Each measures a different set of concepts.
IUIPC
Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15, 4 (2004), 336–355.
Daniel Votipka, Desiree Abrokwa, and Michelle L. Mazurek. 2020. Building and Validating a Scale for Secure Software Development Self-Efficacy. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–20.
Serge Egelman and Eyal Peer. 2015. Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 2873–2882.
Blase Ur, Felicia Alfieri, Maung Aung, Lujo Bauer, Nicolas Christin, Jessica Colnago, Lorrie Faith Cranor, Henry Dixon, Pardis Emami Naeini, Hana Habib, Noah Johnson, William Melicher. Design and Evaluation of a Data-Driven Password Meter In Proceedings of CHI 2017.
Password administration for system owners by the National Cyber Security Center of the United Kingdom - one of the first countries to officially advocate for user-friendly password rules
Sending fake phishing messages to employees is based on this and other PhishGuru work.
Learning Outcomes
Topics
Phishing
Psychology around risk
Teachable moments
Understand
Phishing is actually an authentication problem.
Training users involves thinking about what they need and when.
Apply
Try reading the University of Waterloo’s anit-phishing guidance.
Additional Resources
Cases where skilled people fell for phishing
How to Lose a Fortune with Just One Bad Click - Attacker was able to send an email from google.com which was correctly signed by Google. Getting an email fron Google caused the victim to feel safe and like the represenative on the phone was real.
Pluralistic: How I got scammed - account of Cory Doctorow who is a security researcher and was successfully scammed by someone pretending to be his bank
Its easy to impact the views of others just by how a question is asked.
Match approaches to the type of information you want to know
Apply
Try asking friends or family what three things they would suggest other people do to stay safe online. Do their suggestions match the common suggestions?
For this module you will start by thinking about how you yourself think about and act in regards to security. People rarely take the time to think about their security and therefore you may find yourself forming opinions as you think. The various activities in this module are inteded to ellicit preferences, attitudes, opinions, knowledge, and intended behavior from people.
Security is known as a “secondary task” that is something that has to be done in order to complete other tasks. For example, people rarely have the goal of unlocking the door to their home, instead they have a goal like “go inside” which has a sub-task of “unlock the door”. Similarly people rarely go to the Facebook homepage to login, instead they go to view their feed or post. Logging in is a sub-task of gaining further access.
Staying safe online
Online safety is a deceptively complex task for most users. It involves everything from their understanding of the threats, to their models of how computers work, and even their expectations around how effective different mitigation strategies are. In this module we will be discussing how people go about keeping themselves safe and what they define “safe” as. Towards the end of the module we will also discuss the widely accepted definiton of security and how that aligns with what we have learned about people.
Eliciting views and preferences
Asking people about security views, preferences, attitudes, and behaviors can be supprisingly complex. There are two main problems. 1) There is a known “correct” answer which is that they are as secure as possible. People like to look like they are doing the right thing, so when you ask them they may answer as if they are doing the best thing even if they are not. 2) People don’t think about security very often and as people we develop opinions by talking and thinking about things. So when you ask them about security they start thinking about the problem and generate opinons as they are talking. For example, most Canadians can easily answer questions like “what is your favorite type of music” or “which hocky team do you support” because they have thought about these issues before. Compare that to “What door in Davis Center do you most enjoy walking through?” You probably never thought about the issue of Davis Center doors before, but you are now thinking about the issue and developing an opinion. Perhapse you are recalling the experience of walking through the door nearest the Tim Hortons and smelling the coffee. Or the sound of library wispers when you walk through the library entrance door. Asking about security is somewhat similar to asking about Davis Center doors. Most people have at best a vauge opinion before being asked and then develop an opinion as they answer the question.
Elliciting views and preferences in security can be challenging but there are a range of ways to do it that minimize bias. There are also a range of methods meant to help with self-reflection that allows people to assess and possibly improve their own security approaches.