SlideShare a Scribd company logo
Components of a Model of
Cybersecurity Behavior Adoption
Cori Faklaris,
Carnegie Mellon University
Workshop on Security Information Workers
Symposium on Usable Privacy and Security
Aug. 8, 2021
August 2021
Agenda ▪ Introduction
▪ Existing models and their relevant
components
▪ Overview of my thesis research to start
defining the learning/adoption
trajectories for end-user cybersecurity
behavior
▪ Implications
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 2
About Cori (@heycori)
▪ 5th year PhD candidate and researcher at the
Human-Computer Interaction Institute, School of
Computer Science, Carnegie Mellon University.
▪ Knight Fellow of the Center for Informed Democracy and
Social Cybersecurity (IDeaS); CMU Presidential Fellow of
the CyLab Security & Privacy Institute.
▪ Co-principal investigator on the NSF Social Cybersecurity
project at the HCII (https://socialcybersecurity.org/ ).
▪ Past career in journalism, IT and social media
(https://corifaklaris.com).
▪ Published at the USENIX Symposium on Usable Privacy
and Security (SOUPS) and in Proceedings of the ACM:
Human-Computer Interaction (CSCW), other venues.
3
Problem:
Cyberdefense
(Non-) Adoption
▪ Computing systems are increasingly
central to society.
▪ But, many people do not understand
enough about how they work - or what
cyber-threats to guard against.
▪ Meanwhile, global costs of cybercrime
jumped >50% in 2019-20, to over $1T.
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 4
Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. “My Data Just Goes Everywhere:” User Mental Models of the Internet and Implications for Privacy and Security. In Symposium on Usable Privacy and Security (SOUPS), USENIX
Association Berkeley, CA, 39–52. Retrieved from https://www.usenix.org/conference/soups2015/proceedings/presentation/kang
Zhanna Malekos Smith, Eugenia Lostri, and James A Lewis. 2020. The Hidden Costs of Cybercrime. McAfee.
Problem:
Cyberdefense
(Non-) Adoption
▪ Enterprise security training can cost
around $300,000 + 100s of staff hours.
▪ Difficult to persuade users to accept and
adopt security measures when they or
their peers do not view these measures
positively.
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 5
Tara Seals. 2017. Cost of User Security Training Tops $290K Per Year. Infosecurity Magazine. Retrieved January 20, 2021 from https://www.infosecurity-magazine.com:443/news/cost-of-user-security-training/
Cori Faklaris, Laura Dabbish, and Jason I Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), USENIX Association Berkeley, CA, Santa Clara, CA, 18. Retrieved from
https://www.usenix.org/system/files/soups2019-faklaris.pdf
Sauvik Das, Adam D.I. Kramer, Laura A. Dabbish, and Jason I. Hong. 2015. The Role of Social Influence in Security Feature Adoption. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW ’15), ACM, New York, NY, USA, 1416–1426.
DOI:https://doi.org/10.1145/2675133.2675225
To reduce costs and
improve awareness
+ adoption, we should
apply insights from:
▪ social psychology,
▪ marketing, and
▪ public health.
6
Key Insight for
Cyberdefense
An empirical
understanding of the
cyberdefense adoption
process will help us to
specify the mental states
and social influences
acting at each step,
leading to better targeting
and timing of security
interventions.
7
My Thesis
8
Cori Faklaris. 2021. Components of a Model
of Cybersecurity Behavior Adoption. In
Workshop on Security Information
Workers. Retrieved from
https://corifaklaris.com/files/Faklaris_WS
IW2021_stagemodels.pdf
● Many models of behavior adoption focus on concepts
of expectancy (how likely it is thought that a desired,
instrumental outcome will occur) and value (how
much the outcome has importance or utility).
● They do not account for time or how thinking evolves.
Search string in Google Scholar using an "incognito" browser window in July 2021 Results
fogg behavior model and cybersecurity 395
decisional balance theory and cybersecurity 1210
prospect theory and cybersecurity 13700
health belief model and cybersecurity 19500
theory of reasoned action and cybersecurity 18900
theory of planned behavior and cybersecurity 25000
protection motivation theory and cybersecurity 27800
technology acceptance model and cybersecurity 31300
Focus:
Understand
Process of
Cyberdefense
(Non-) Adoption
Theoretical Modeling
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 8
Theory of Planned Behavior (TPB)
9
Protection Motivation Theory (PMT)
10
Technology Acceptance Model (TAM)
11
12
Cori Faklaris. 2021. Components of a Model
of Cybersecurity Behavior Adoption. In
Workshop on Security Information
Workers. Retrieved from
https://corifaklaris.com/files/Faklaris_WS
IW2021_stagemodels.pdf
● Stage models of behavior change account for the
progress of time, breaking the continuum into chunks.
● The Transtheoretical Model sees change as a cyclical
process, in which the associated processes of change
help move people from one stage to the next.
● The Precaution Adoption Process Model break down
“inaction” into unawareness, unengaged, undecided, and
decided not to act; “action’ stages are like TTM.
● The Diffusion of Innovations process model accounts for
more “action” stage changes such as confirmation, later
adoption, and discontinuance of adoption.
Search string in Google Scholar using an "incognito" browser window in July 2021 Results
transtheoretical model and cybersecurity 112
precaution adoption process model and cybersecurity 9610
diffusion of innovations and cybersecurity 17300
Focus:
Understand
Process of
Cyberdefense
(Non-) Adoption
Theoretical Modeling
Transtheoretical Model (TTM)
13
Experiential
processes
Behavioral processes
Diffusion of Innovations (DoI) Process Model
14
RQ: What stages do people go through in
adoption (or non-adoption) of
cybersecurity behaviors?
15
Phase 3
Method: Exploratory Sequential Mixed-Methods
16
John W. Creswell and J. David Creswell. 2017. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. SAGE Publications. Retrieved from https://play.google.com/store/books/details?id=KGNADwAAQBAJ
Surveys
Interviews Analysis Survey
Design
Analysis
Triangulation
and Integration
Phase 1 - Qualitative Phase 2 - Quantitative
Mandatory adoption
Cybersecurity has
two different
learning/
adoption
trajectories
Voluntary adoption
17
Learning
Persuasion Adoption
Learning
Threat
Authorities
Adoption
Threat
Peers/Media
Persuasion
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 17
Implications:
Specify how
the stages
might vary
for different
security
measures
For tool-based practices
such as password
managers, 2FA
authentication:
How many are aware of,
motivated, and/or able to
use each of the tools?
How much do social
influences and
voluntariness weigh in the
decision to adopt?
Why do people stop using
the tools, once adopted?
For knowledge-based
practices such as timely
updates, alertness to
“fake news”:
How many people are
aware of which practices
have merit, and when?
Which cognitions or
contexts cue them to act
out practices?
Whiat defeats their
intention to act out
practices?
18
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 18
Outcome:
Stage Model of
Cybersecurity
Behavior
Adoption
▪ Moves the field of usable security away
from “one size fits all” strategies
▪ Use to create a classification algorithm
to direct resources, “interventions”
(such as security tips or interface
nudges) to those most likely to benefit.
▪ Boost effectiveness of cybersecurity risk
assessments in resource-tight orgs
▪ Help adoption researchers to sharpen
strategies, build business value
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 19
Future work Collect experimental evidence for targeting
security interventions by stage and by tool:
▪ Password managers
▪ Software updates
Examine how this and/or other stage
models, such as Diffusion of Innovations,
can be adapted for enterprise teams
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 20
Mandatory adoption
What are your
questions /
feedback on
these ideas?
Voluntary adoption
21
Learning
Persuasion Adoption
Learning
Threat
Authorities
Adoption
Threat
Peers/Media
Persuasion
Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 21

More Related Content

PPTX
Behavior Change Using Social Influences
PPTX
The Internet of Things and Future Shock: Too Much Change Too Fast?
PPTX
LEPC: Social media and disasters
PDF
Toolkit on factchecking by shreedeep rayamajhi
PDF
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
PDF
Final survey on disinformation and its practice during covid 19 in developing...
PDF
Privacy and Security on Social Media
Behavior Change Using Social Influences
The Internet of Things and Future Shock: Too Much Change Too Fast?
LEPC: Social media and disasters
Toolkit on factchecking by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Final survey on disinformation and its practice during covid 19 in developing...
Privacy and Security on Social Media

What's hot (20)

PPTX
LifeLock Javelin Presentation
PPTX
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
PDF
Opportunities and Challenges in Crisis Informatics
PDF
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
PPT
Privacy and Social Networks
PDF
OSA - Internet Security in India
PDF
Fall2015SecurityShow
PPT
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
PDF
Impact of trust, security and privacy concerns in social networking: An explo...
PDF
Cyber Surveillance - Honors English 1 Presentation
PPTX
Trusting the internet
PDF
Digital Fault-Lines
PDF
Thesis proposal v3
PDF
Raytheon Millennial Cybersecurity Survey
PDF
A week is a long time in computer ethics
PPTX
I4ADA 2019 - Accountability, Social Media & Journalism
DOC
Order 32740459
PPTX
Presentation slides
PPTX
Cyber intelligence sharing and protection act research
LifeLock Javelin Presentation
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
Opportunities and Challenges in Crisis Informatics
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Privacy and Social Networks
OSA - Internet Security in India
Fall2015SecurityShow
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
Impact of trust, security and privacy concerns in social networking: An explo...
Cyber Surveillance - Honors English 1 Presentation
Trusting the internet
Digital Fault-Lines
Thesis proposal v3
Raytheon Millennial Cybersecurity Survey
A week is a long time in computer ethics
I4ADA 2019 - Accountability, Social Media & Journalism
Order 32740459
Presentation slides
Cyber intelligence sharing and protection act research
Ad

Similar to Components of a Model of Cybersecurity Behavior Adoption (20)

PDF
Reframing Usable Privacy + Security to Design for 'Cyber Health'
PPTX
Connecting Attitudes and Social Influences with Designs for Usable Security a...
PDF
Reframing Organizational Cybersecurity to Design for “Cyber Health”
PPTX
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
PDF
Artificial Intelligence – Time Bomb or The Promised Land?
DOCX
L. Marinos and I. Askoxylakis (Eds.) HASHCII 2013, LNCS 8030.docx
DOCX
Current cybersecurity solutions leave a wide gap in coverage,” .docx
PPTX
Jonas hallberg. securit
DOCX
Common Models in Health Informatics Evaluation.docx
PDF
THE RELATIONSHIP BETWEEN THE CHARACTERISTICS OF SOFTWARE DEVELOPERS AND SECUR...
PDF
TECHNOLOGY ACCEPTANCE MODELS & FRAMEWORKS
PPT
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
PDF
Security in the Software Development Life Cycle (SDLC)
DOCX
Common Models in Health Informatics EvaluationHave you ever watche.docx
PPTX
Research proposal presentation ver 3.0
PDF
Designing for Usable Security and Privacy
PPTX
Cyber Security PPT.pptx
PDF
A Case for Expectation Informed Design
PDF
Investigating the Determinants of College Students Information Security Behav...
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Connecting Attitudes and Social Influences with Designs for Usable Security a...
Reframing Organizational Cybersecurity to Design for “Cyber Health”
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
Artificial Intelligence – Time Bomb or The Promised Land?
L. Marinos and I. Askoxylakis (Eds.) HASHCII 2013, LNCS 8030.docx
Current cybersecurity solutions leave a wide gap in coverage,” .docx
Jonas hallberg. securit
Common Models in Health Informatics Evaluation.docx
THE RELATIONSHIP BETWEEN THE CHARACTERISTICS OF SOFTWARE DEVELOPERS AND SECUR...
TECHNOLOGY ACCEPTANCE MODELS & FRAMEWORKS
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Security in the Software Development Life Cycle (SDLC)
Common Models in Health Informatics EvaluationHave you ever watche.docx
Research proposal presentation ver 3.0
Designing for Usable Security and Privacy
Cyber Security PPT.pptx
A Case for Expectation Informed Design
Investigating the Determinants of College Students Information Security Behav...
Ad

More from Cori Faklaris (14)

PDF
Understanding and Mitigating SMiShing Vulnerability: Insights from U.S. Surve...
PDF
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
PPTX
Human Factors at the Grid Edge
PDF
An Introduction to Generative AI
PDF
A Self-Report Measure of End-User Security Attitudes (SA-6)
PPTX
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
PDF
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
PDF
Social Media Best Practices - CMU Fall 2017
PPT
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
PPTX
"Visualizing Email Content": Article discussion slides
PPTX
Together: An app to foster community for young urbanites
PPTX
The State of E-Discovery as Social Media Goes Mobile
PPT
5 ideas for paying for college as an adult returning student
PPTX
Social media boot camp: "HeyCori"'s tips for successful engagement online
Understanding and Mitigating SMiShing Vulnerability: Insights from U.S. Surve...
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
Human Factors at the Grid Edge
An Introduction to Generative AI
A Self-Report Measure of End-User Security Attitudes (SA-6)
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Social Media Best Practices - CMU Fall 2017
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
"Visualizing Email Content": Article discussion slides
Together: An app to foster community for young urbanites
The State of E-Discovery as Social Media Goes Mobile
5 ideas for paying for college as an adult returning student
Social media boot camp: "HeyCori"'s tips for successful engagement online

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
sap open course for s4hana steps from ECC to s4
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Mobile App Security Testing_ A Comprehensive Guide.pdf
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
“AI and Expert System Decision Support & Business Intelligence Systems”
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Components of a Model of Cybersecurity Behavior Adoption

  • 1. Components of a Model of Cybersecurity Behavior Adoption Cori Faklaris, Carnegie Mellon University Workshop on Security Information Workers Symposium on Usable Privacy and Security Aug. 8, 2021 August 2021
  • 2. Agenda ▪ Introduction ▪ Existing models and their relevant components ▪ Overview of my thesis research to start defining the learning/adoption trajectories for end-user cybersecurity behavior ▪ Implications Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 2
  • 3. About Cori (@heycori) ▪ 5th year PhD candidate and researcher at the Human-Computer Interaction Institute, School of Computer Science, Carnegie Mellon University. ▪ Knight Fellow of the Center for Informed Democracy and Social Cybersecurity (IDeaS); CMU Presidential Fellow of the CyLab Security & Privacy Institute. ▪ Co-principal investigator on the NSF Social Cybersecurity project at the HCII (https://socialcybersecurity.org/ ). ▪ Past career in journalism, IT and social media (https://corifaklaris.com). ▪ Published at the USENIX Symposium on Usable Privacy and Security (SOUPS) and in Proceedings of the ACM: Human-Computer Interaction (CSCW), other venues. 3
  • 4. Problem: Cyberdefense (Non-) Adoption ▪ Computing systems are increasingly central to society. ▪ But, many people do not understand enough about how they work - or what cyber-threats to guard against. ▪ Meanwhile, global costs of cybercrime jumped >50% in 2019-20, to over $1T. Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 4 Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. “My Data Just Goes Everywhere:” User Mental Models of the Internet and Implications for Privacy and Security. In Symposium on Usable Privacy and Security (SOUPS), USENIX Association Berkeley, CA, 39–52. Retrieved from https://www.usenix.org/conference/soups2015/proceedings/presentation/kang Zhanna Malekos Smith, Eugenia Lostri, and James A Lewis. 2020. The Hidden Costs of Cybercrime. McAfee.
  • 5. Problem: Cyberdefense (Non-) Adoption ▪ Enterprise security training can cost around $300,000 + 100s of staff hours. ▪ Difficult to persuade users to accept and adopt security measures when they or their peers do not view these measures positively. Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 5 Tara Seals. 2017. Cost of User Security Training Tops $290K Per Year. Infosecurity Magazine. Retrieved January 20, 2021 from https://www.infosecurity-magazine.com:443/news/cost-of-user-security-training/ Cori Faklaris, Laura Dabbish, and Jason I Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), USENIX Association Berkeley, CA, Santa Clara, CA, 18. Retrieved from https://www.usenix.org/system/files/soups2019-faklaris.pdf Sauvik Das, Adam D.I. Kramer, Laura A. Dabbish, and Jason I. Hong. 2015. The Role of Social Influence in Security Feature Adoption. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW ’15), ACM, New York, NY, USA, 1416–1426. DOI:https://doi.org/10.1145/2675133.2675225
  • 6. To reduce costs and improve awareness + adoption, we should apply insights from: ▪ social psychology, ▪ marketing, and ▪ public health. 6 Key Insight for Cyberdefense
  • 7. An empirical understanding of the cyberdefense adoption process will help us to specify the mental states and social influences acting at each step, leading to better targeting and timing of security interventions. 7 My Thesis
  • 8. 8 Cori Faklaris. 2021. Components of a Model of Cybersecurity Behavior Adoption. In Workshop on Security Information Workers. Retrieved from https://corifaklaris.com/files/Faklaris_WS IW2021_stagemodels.pdf ● Many models of behavior adoption focus on concepts of expectancy (how likely it is thought that a desired, instrumental outcome will occur) and value (how much the outcome has importance or utility). ● They do not account for time or how thinking evolves. Search string in Google Scholar using an "incognito" browser window in July 2021 Results fogg behavior model and cybersecurity 395 decisional balance theory and cybersecurity 1210 prospect theory and cybersecurity 13700 health belief model and cybersecurity 19500 theory of reasoned action and cybersecurity 18900 theory of planned behavior and cybersecurity 25000 protection motivation theory and cybersecurity 27800 technology acceptance model and cybersecurity 31300 Focus: Understand Process of Cyberdefense (Non-) Adoption Theoretical Modeling Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 8
  • 9. Theory of Planned Behavior (TPB) 9
  • 12. 12 Cori Faklaris. 2021. Components of a Model of Cybersecurity Behavior Adoption. In Workshop on Security Information Workers. Retrieved from https://corifaklaris.com/files/Faklaris_WS IW2021_stagemodels.pdf ● Stage models of behavior change account for the progress of time, breaking the continuum into chunks. ● The Transtheoretical Model sees change as a cyclical process, in which the associated processes of change help move people from one stage to the next. ● The Precaution Adoption Process Model break down “inaction” into unawareness, unengaged, undecided, and decided not to act; “action’ stages are like TTM. ● The Diffusion of Innovations process model accounts for more “action” stage changes such as confirmation, later adoption, and discontinuance of adoption. Search string in Google Scholar using an "incognito" browser window in July 2021 Results transtheoretical model and cybersecurity 112 precaution adoption process model and cybersecurity 9610 diffusion of innovations and cybersecurity 17300 Focus: Understand Process of Cyberdefense (Non-) Adoption Theoretical Modeling
  • 14. Diffusion of Innovations (DoI) Process Model 14
  • 15. RQ: What stages do people go through in adoption (or non-adoption) of cybersecurity behaviors? 15
  • 16. Phase 3 Method: Exploratory Sequential Mixed-Methods 16 John W. Creswell and J. David Creswell. 2017. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. SAGE Publications. Retrieved from https://play.google.com/store/books/details?id=KGNADwAAQBAJ Surveys Interviews Analysis Survey Design Analysis Triangulation and Integration Phase 1 - Qualitative Phase 2 - Quantitative
  • 17. Mandatory adoption Cybersecurity has two different learning/ adoption trajectories Voluntary adoption 17 Learning Persuasion Adoption Learning Threat Authorities Adoption Threat Peers/Media Persuasion Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 17
  • 18. Implications: Specify how the stages might vary for different security measures For tool-based practices such as password managers, 2FA authentication: How many are aware of, motivated, and/or able to use each of the tools? How much do social influences and voluntariness weigh in the decision to adopt? Why do people stop using the tools, once adopted? For knowledge-based practices such as timely updates, alertness to “fake news”: How many people are aware of which practices have merit, and when? Which cognitions or contexts cue them to act out practices? Whiat defeats their intention to act out practices? 18 Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 18
  • 19. Outcome: Stage Model of Cybersecurity Behavior Adoption ▪ Moves the field of usable security away from “one size fits all” strategies ▪ Use to create a classification algorithm to direct resources, “interventions” (such as security tips or interface nudges) to those most likely to benefit. ▪ Boost effectiveness of cybersecurity risk assessments in resource-tight orgs ▪ Help adoption researchers to sharpen strategies, build business value Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 19
  • 20. Future work Collect experimental evidence for targeting security interventions by stage and by tool: ▪ Password managers ▪ Software updates Examine how this and/or other stage models, such as Diffusion of Innovations, can be adapted for enterprise teams Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 20
  • 21. Mandatory adoption What are your questions / feedback on these ideas? Voluntary adoption 21 Learning Persuasion Adoption Learning Threat Authorities Adoption Threat Peers/Media Persuasion Cori Faklaris • Carnegie Mellon University • corifaklaris.com • @heycori • 21