skip to main content
10.1145/2078827.2078831acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings

Published:20 July 2011Publication History

ABSTRACT

We replicated and extended a 2008 study conducted at CMU that investigated the effectiveness of SSL warnings. We adjusted the experimental design to mitigate some of the limitations of that prior study; adjustments include allowing participants to use their web browser of choice and recruiting a more representative user sample. However, during our study we observed a strong disparity between our participants actions during the laboratory tasks and their self-reported "would be" actions during similar tasks in everyday computer practices. Our participants attributed this disparity to the laboratory environment and the security it offered. In this paper we discuss our results and how the introduced changes to the initial study design may have affected them. Also, we discuss the challenges of observing natural behavior in a study environment, as well as the challenges of replicating previous studies given the rapid changes in web technology. We also propose alternatives to traditional laboratory study methodologies that can be considered by the usable security research community when investigating research questions involving sensitive data where trust may influence behavior.

References

  1. M. S. Ackerman, L. F. Cranor, and J. Reagle. Privacy in e-commerce: examining user scenarios and privacy preferences. In Proceedings of the 1st ACM conference on Electronic commerce, EC '99, pages 1--8, New York, NY, USA, 1999. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Biddle, P. C. van Oorschot, A. S. Patrick, J. Sobey, and T. Whalen. Browser interfaces and extended validation ssl certificates: an empirical study. In Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pages 19--30, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. C. Brustoloni and R. Villamarín-Salomón. Improving security decisions with polymorphic and audited dialogs. In SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security, pages 76--85, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Cockburn and B. McKenzie. What do web users do? an empirical analysis of web use. Int. J. Human-Computer Studies, 54:903--922, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In CHI '06: Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pages 581--590, Montréal, Québec, Canada, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. J. Dommeyer and B. L. Gross. What consumers know and what they do: An investigation of consumer knowledge, awareness, and use of privacy protection strategies. Journal of Interactive Marketing, 17(2):34--51, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  7. S. Egelman, L. F. Cranor, and J. Hong. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In CHI '08: Proc. of the SIGCHI conf. on Human factors in Computing Systems, pages 1065--1074, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Gefen, E. Karahanna, and D. W. Straub. Trust and tam in online shopping: An integrated model. MIS Quarterly, 27(1):pp. 51--90, 2003. Google ScholarGoogle ScholarCross RefCross Ref
  9. J. Gideon, L. Cranor, S. Egelman, and A. Acquisti. Power strips, prophylactics, and privacy, oh my! pages 133--144. ACM Press New York, NY, USA, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Henrich, S. Heine, and A. Norenzayan. Most people are not weird. Nature, (466):29, 2010.Google ScholarGoogle Scholar
  11. T. Jackson. How our spam filter works. Technical report, Google, 2007.Google ScholarGoogle Scholar
  12. T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Commun. ACM, 50(10):94--100, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Jakobsson and J. Ratkiewicz. Designing ethical phishing experiments: a study of (rot13) ronl query features. In WWW '06: Proceedings of the 15th international conference on World Wide Web, pages 513--522, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Patrick. Commentary on research on new security indicators - essay. http://www.andrewpatrick.ca/essays/commentary-on-research-on-new-security-indicators, 2007.Google ScholarGoogle Scholar
  15. M. L. Russell, M. G. Donna, and E. Burgess. Paying research subjects: participants' perspectives. Journal of Medical Ethics, 26(2):126--130, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  16. S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 51--65, Washington, DC, USA, 2007. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. W. Stewart and I. M. Martin. Intended and unintended consequences of warning messages: A review and synthesis of empirical research. Journal of Public Policy and Marketing, 13(1):1--19, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  18. J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An empirical study of SSL warning effectiveness. In Proceedings of 18th USENIX Security Symposium, pages 399--432, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. J. B. R. van Oorschot P. C. Patrick A. S. Exploring user reactions to new browser cues for extended validation certificates. In Proceedings of the 13th European Symposium on Research in Computer-Security, pages 411--427, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. T. Whalen and K. M. Inkpen. Gathering evidence: use of visual security cues in web browsers. In Graphics Interface, pages 137--144. Canadian Human-Computer Communications Society, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Wogalter. Purpose and scope of warnings. In Handbook of Warnings, pages 3--9. Lawrence Erlbaum Associates, 2006.Google ScholarGoogle Scholar
  22. M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In Proceedings of the SIGCHI conference on Human Factors in computing systems (CHI '06), pages 601--610, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                SOUPS '11: Proceedings of the Seventh Symposium on Usable Privacy and Security
                July 2011
                253 pages
                ISBN:9781450309110
                DOI:10.1145/2078827

                Copyright © 2011 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 20 July 2011

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate15of49submissions,31%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader