skip to main content
10.1145/2702613.2732912acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Work in Progress

Perceived Risk and Self-Efficacy Regarding Internet Security in a Marginalized Community

Published: 18 April 2015 Publication History

Abstract

As part of the ongoing CRISP project (Communicating Risk in Internet Security and Privacy), we conducted a user study in a marginalized community to better understand community members' interactions with computers and the Internet in terms of security and privacy. We used the Health Belief Model to understand what factors affect members' behavior when a potential attack is present. In particular, we focused on two factors, perceived risk and self-efficacy, and interviewed 44 participants about them. In this paper, we report our preliminary quantitative and qualitative findings.

References

[1]
Dutta-Bergman, M.J. Theory and practice in health communication campaigns: A critical interrogation. Health Communication, 18(2) (2005), 103--122.
[2]
Janz, N. K. and Becker, M. H. The Health Belief Model: A Decade Later. Health Education & Behavior, 11(1) (1984), 1--47.
[3]
Langlois, M. A. and Hallam, J. S. Integrating Multiple Health Behavior Theories Into Program Planning: The PER Worksheet. Health Promotion Practice, 11(2) (2010), 282--288.
[4]
Ng, B.-Y., Kankanhalli, A. and Xu, Y. Studying users' computer security behavior: A health belief perspective. Decis. Support Syst., 46(4) (2009), 815825.
[5]
Open Web Application Security Project. OWASP Top Ten Project for 2013. (2013)
[6]
Rosenstock, I. M. Historical origins of the health belief model. Health Education Monographs, 2 (1974), 328--335.
[7]
Rosenstock, I. M., Strecher, V. J. and Becker, M. H. Social learning theory and the Health Belief Model. Health Education Quarterly, 15(2) (1988), 175--183.

Cited By

View all
  • (2024)Self-Efficacy and Security Behavior: Results from a Systematic Review of Research MethodsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642432(1-32)Online publication date: 11-May-2024
  • (2020)Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FA2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC48688.2020.0-166(778-789)Online publication date: Jul-2020

Index Terms

  1. Perceived Risk and Self-Efficacy Regarding Internet Security in a Marginalized Community

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI EA '15: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems
    April 2015
    2546 pages
    ISBN:9781450331463
    DOI:10.1145/2702613
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 April 2015

    Check for updates

    Author Tags

    1. browser add-on
    2. marginalized community
    3. marginalized population
    4. mixed methods
    5. qualitative methods
    6. quantitative methods
    7. underserved community
    8. urban computing
    9. usable security

    Qualifiers

    • Work in progress

    Funding Sources

    • NSF

    Conference

    CHI '15
    Sponsor:
    CHI '15: CHI Conference on Human Factors in Computing Systems
    April 18 - 23, 2015
    Seoul, Republic of Korea

    Acceptance Rates

    CHI EA '15 Paper Acceptance Rate 379 of 1,520 submissions, 25%;
    Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 23 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Self-Efficacy and Security Behavior: Results from a Systematic Review of Research MethodsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642432(1-32)Online publication date: 11-May-2024
    • (2020)Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FA2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC48688.2020.0-166(778-789)Online publication date: Jul-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media