skip to main content
research-article

'I Knew It Was Too Good to Be True": The Challenges Economically Disadvantaged Internet Users Face in Assessing Trustworthiness, Avoiding Scams, and Developing Self-Efficacy Online

Published:01 November 2018Publication History
Skip Abstract Section

Abstract

In the U.S., consumers increasingly turn to the internet and mobile apps to complete essential personal transactions, ranging from financial payments to job applications. This shift to digital transactions can create challenges for those without reliable home internet connections or with limited digital literacy by requiring them to submit sensitive information on public computers or on unfamiliar websites. Using interviews with 52 families from high-poverty communities in the mid-Atlantic region of the U.S., we explore the compounding privacy and security challenges that economically disadvantaged individuals face when navigating online services. We describe the real, perceived, and unknown risks they face as they navigate online transactions with limited technical skills, as well as the strategies and heuristics they employ to minimize these risks. The findings highlight a complex relationship between participants' negative experiences and their general mistrust of sharing data through online channels. We also describe a range of strategies participants use to try and protect their personal information. Based on these findings, we offer design recommendations to inform the creation of educational resources that we will develop in the next phase of this project.

References

  1. Annette Baier. 1986. Trust and antitrust. Ethics, 96, 2 (1986), 231--260.Google ScholarGoogle ScholarCross RefCross Ref
  2. Jonathan Ben-Naim, Jean-François Bonnefon, Andreas Herzig, Sylvie Leblois and Emiliano Lorini. 2017. Computer-mediated trust in self-interested expert recommendations. AI & Society, 25, 4 (2010), 413--422.Google ScholarGoogle ScholarCross RefCross Ref
  3. Denis Besnard, David Greathead and Gordon Baxter. 2004. When mental models go wrong: co-occurrences in dynamic, critical systems. International Journal of Human-Computer Studies, 60, 1 (2004), 117--128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jasmine Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, and Kevin Butler. 2017. Regulators, mount up! Analysis of privacy policies for mobile money services. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (pp. 97--114). USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jay Chen, Michael Paik, and Kelly McCabe. 2014. Exploring internet security perceptions and practices in urban Ghana. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (pp. 129--142). USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Wei Chen and Simon Fong. 2010. Social network collaborative filtering framework and online trust factors: A case study on Facebook. Proceedings of the Fifth International Conference on Digital Information Management (ICDIM) (pp. 266--273). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  7. Erika Chin, Adrienne Porter Felt, Vyas Sekar and David Wagner. 2012. Measuring user confidence in smartphone security and privacy. Proceedings of the Eighth Symposium on Usable Privacy and Security (Article No. 1). New York: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Catherine Dwyer, Starr Hiltz and Katia Passerini. 2007. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 proceedings (2007), Article 339.Google ScholarGoogle Scholar
  9. Matthew S Eastin and Robert LaRose. 2000. Internet self-efficacy and the psychology of the digital divide. Journal of Computer-Mediated Communication, 6, 1 (2000), n.p.Google ScholarGoogle Scholar
  10. Andrew J Flanagin and Miriam J Metzger. 2008. Digital media and youth: Unparalleled opportunity and unprecedented responsibility. Digital Media, Youth, and Credibility, Edited by Miriam J. Metzger and Andrew J. Flanagin. The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning. Cambridge, MA: The MIT Press, 2008 (pp. 5--28).Google ScholarGoogle Scholar
  11. Qin Gao, Ye Tian and Mengyuan Tu. 2015. Exploring factors influencing Chinese user's perceived credibility of health and safety information on Weibo. Computers in Human Behavior, 45 (2015), 21--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Karen Glanz and Donald B. Bishop. 2010. The role of behavioral science theory in development and implementation of public health interventions. Annual Review of Public Health, 31 (2010), 399--418.Google ScholarGoogle ScholarCross RefCross Ref
  13. Shawn Glynn. 1997. Drawing mental models. The Science Teacher, 64, 1 (1997), 30--32.Google ScholarGoogle Scholar
  14. Ricardo Gomez and Elizabeth Gould. 2010. The 'cool factor" of public access to ICT: Users' perceptions of trust in libraries, telecentres and cybercafés in developing countries. Information Technology & People, 23, 3 (2010), 247--264.Google ScholarGoogle ScholarCross RefCross Ref
  15. Eszter Hargittai. 2002. Second-level digital divide: Mapping differences in people's online skills. First Monday, 7, 4 (2002), n.p.Google ScholarGoogle Scholar
  16. Eszter Hargittai. 2003. The digital divide and what to do about it. New economy handbook, 2003 (2003), 821--839.Google ScholarGoogle Scholar
  17. Eszter Hargittai. 2005. Survey measures of Web-oriented digital literacy. Social Science Computer Review, 23 3, (2005), 371--379. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Eszter Hargittai and Yuli Patrick Hsieh. 2012. Succinct survey measures of web-use skills. Social Science Computer Review, 30, 1 (2012), 95--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Amanda Hess. 2017. How privacy became a commodity for the rich and powerful. New York Times Magazine (May 9, 2017).Google ScholarGoogle Scholar
  20. Donna L Hoffman, Thomas P Novak and Marcos Peralta. 1999. Building consumer trust online. Communications of the ACM, 42, 4 (1999), 80--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. John B Horrigan. 2016. Digital readiness gaps. Pew Research Center (2016).Google ScholarGoogle Scholar
  22. Adele E Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska and Zinta Byrne. 2012. The psychology of security for the home computer user. Proceedings of the 2012 IEEE Symposium on Security and Privacy (pp. 209--223). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Internet Crime Complaint Center. 2016. Internet Crime Report Internet Crime Complaint Center. Available: https://pdf.ic3.gov/2016_IC3Report.pdfGoogle ScholarGoogle Scholar
  24. Iulia Ion, Rob Reeder and Sunny Consolvo. 2015. '... No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices. City.Google ScholarGoogle Scholar
  25. Paul T Jaeger, John Carlo Bertot, Kim M Thompson, Sarah M Katz and Elizabeth J DeCoster. 2012. The intersection of public policy and public access: Digital divides, digital literacy, digital inclusion, and public libraries. Public Library Quarterly, 31, 1 (2012), 1--20.Google ScholarGoogle ScholarCross RefCross Ref
  26. Joseph W Jerome. 2013. Buying and selling privacy: Big data's difference burdens and benefits. Stanfor. Law Review Online, 66 (2013), 47--53Google ScholarGoogle Scholar
  27. Kyung Kyu Kim and Bipin Prabhakar. 2004. Initial trust and the adoption of B2C e-commerce: The case of internet banking. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 35, 2 (2004), 50--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Kimberly Kindy. May 30, 2017. How Congress dismantled federal Internet privacy rules. Washington Post. Available: https://www.washingtonpost.com/politics/how-congress-dismantled-federal-internet-privacy-rules/2017/05/29/7ad06e14--2f5b-11e7--8674--437ddb6e813e_story.html?utm_term=.7de600dbda1cGoogle ScholarGoogle Scholar
  29. Joshua Klayman and Young-Won Ha. 1987. Confirmation, disconfirmation, and information in hypothesis testing. Psychological Review, 94, 2 (1987), 211--228.Google ScholarGoogle ScholarCross RefCross Ref
  30. Joshua Klayman and Young-won Ha. 1989. Hypothesis testing in rule discovery: Strategy, structure, and content. Journal of Experimental Psychology: Learning, Memory, and Cognition, 15, 4 (1989), 596--604.Google ScholarGoogle ScholarCross RefCross Ref
  31. Andrew Large, Valerie Nesset, Jamshid Beheshti and Leanne Bowler. 2006. 'Bonded design": A novel approach to intergenerational information technology design. Library & Information Science Research, 28, 1 (2006), 64--82.Google ScholarGoogle ScholarCross RefCross Ref
  32. Jialiu Lin, Shahriyar Amini, Jason I Hong, Norman Sadeh, Janne Lindqvist and Joy Zhang. 2012. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12) (pp. 501--510). New York: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Yvonna S. Lincoln and Egon G. Guba. Naturalistic inquiry. Sage Publications, Beverly Hills, CA, 1985.Google ScholarGoogle Scholar
  34. Linlin Liu, Matthew KO Lee, Renjing Liu and Jiawen Chen. 2018. Trust transfer in social media brand communities: The role of consumer engagement. International Journal of Information Management, 41 (2018), 1--13.Google ScholarGoogle ScholarCross RefCross Ref
  35. Niklas Luhmann. 2000. Vertrauen: Ein mechanismus der reduktion sozialer komplexität. Grove/Atlantic, Inc.Google ScholarGoogle Scholar
  36. Michael Mackert, LeeAnn Kahlor, Diane Tyler and Jamie Gustafson. 2009. Designing e-health interventions for low-health-literate culturally diverse parents: addressing the obesity epidemic. Telemedicine and e-Health, 15, 7 (2009), 672--677.Google ScholarGoogle ScholarCross RefCross Ref
  37. Madden. 2017. Privacy, security, and digital inequality. Data & Society, https://datasociety.net/pubs/prv/DataAndSociety_PrivacySecurityandDigitalInequality.pdfGoogle ScholarGoogle Scholar
  38. Mary Madden, Michele Gilman, Karen Levy and Alice Marwick. 2017. Privacy, poverty, and big data: a matrix of vulnerabilities for poor Americans. Wash. UL Rev., 95 (2017), 53--125.Google ScholarGoogle Scholar
  39. Michael Muller. 2009. Participatory design: The third space in HCI. Boca Raton, FL: CRC Press.Google ScholarGoogle Scholar
  40. New York Police Department. n.d. NYPD crime prevention alert: Beware of scams using Green Dot MoneyPak cards. Available: http://www.nyc.gov/html/nypd/downloads/pdf/crime_prevention/greendot.pdfGoogle ScholarGoogle Scholar
  41. Kenneth Olmstead and Aaron Smith. 2017. Americans and cybersecurity. Pew Research Center (2017).Google ScholarGoogle Scholar
  42. Yong Jin Park. 2013. Digital literacy and privacy behavior online. Communication Research, 40 2 (2013), 215--236.Google ScholarGoogle ScholarCross RefCross Ref
  43. Emilee Rader and Rick Wash. 2015. Identifying patterns in informal sources of security information. Journal of Cybersecurity, 1, 1 (2015), 121--144.Google ScholarGoogle Scholar
  44. Emilee Rader, Rick Wash, and Brandon Brooks. 2012. Stories as informal lessons about security. Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS) (Article 6). New York: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Lee Rainie, Sara Kiesler, Ruogu Kang, Mary Madden, Maeve Duggan, Stephanie Brown and Laura Dabbish. 2013. Anonymity, privacy, and security online. Pew Research Center (2013). Available: http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/Google ScholarGoogle Scholar
  46. Elissa M Redmiles, Sean Kross and Michelle L Mazurek. 2017. Where is the digital divide?: A survey of security, privacy, and socioeconomics. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 931--936). New York: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Dina Ribbink, Allard CR Van Riel, Veronica Liljander and Sandra Streukens. 2004. Comfort your online customer: quality, trust and loyalty on the internet. Managing Service Quality: An International Journal, 14, 6 (2004), 446--456.Google ScholarGoogle ScholarCross RefCross Ref
  48. Ronald E Rice and James EKatz. 2003. Comparing internet and mobile phone usage: digital divides of usage, adoption, and dropouts. Telecommunications Policy, 27, 8--9 (2006), 597--823.Google ScholarGoogle ScholarCross RefCross Ref
  49. Soo Young Rieh. 2010. Credibility and cognitive authority of information. In M. Bates & M. N. Maack (Eds.) Encyclopedia of Library and Information Sciences, 3rd Ed. (pp. 1337--1344), New York: Taylor and Francis Group, LLC. (2010).Google ScholarGoogle Scholar
  50. Irwin M Rosenstock, Victor J Strecher, and Marshall H Becker. 1988. Social learning theory and the health belief model. Health Education Quarterly, 15 2, (1988) 175--183.Google ScholarGoogle ScholarCross RefCross Ref
  51. Aaron Shaw and Eszter Hargittai. 2018. The pipeline of online participation inequalities: The case of Wikipedia editing. Journal of Communication, 68 1 (2018), 143--168.Google ScholarGoogle ScholarCross RefCross Ref
  52. Wanita Sherchan, Surya Nepal and Cecile Paris. 2013. A survey of trust in social networks. ACM Computing Surveys (CSUR), 45, 4 (2013), Article No. 47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Michael Siegrist and George Cvetkovich. 2000. Perception of hazards: The role of social trust and knowledge. Risk Analysis, 20, 5 (2000), 713--720.Google ScholarGoogle ScholarCross RefCross Ref
  54. Aaron Smith. 2017. What the public knows about cybersecurity. Pew Research Center on Internet and American Life (March 22, 2017). Available: http://www.pewinternet.org/2017/03/22/what-the-public-knows-about-cybersecurity/Google ScholarGoogle Scholar
  55. Laura D Stanley. 2003. Beyond access: psychosocial barriers to computer literacy special issue: ICTs and community networking. The Information Society, 19, 5 (2003), 407--416.Google ScholarGoogle ScholarCross RefCross Ref
  56. Bradley D Stein, Sheryl Kataoka, Lisa H Jaycox, Marleen Wong, Marleen, et al. 2002. Theoretical basis and program design of a school-based mental health intervention for traumatized Immigrant children: A collaborative research partnership. The Journal of Behavioral Health Services & Research, 29, 3 (2002), 318--326.Google ScholarGoogle ScholarCross RefCross Ref
  57. Mega Subramaniam, Natalie Greene Taylor, Beth St. Jean, Rebecca Follman, Christie Kodama and Dana Casciotti. 2015. As simple as that?: Tween credibility assessment in a complex online world. Journal of Documentation, 71, 3 (2015), 550--571.Google ScholarGoogle ScholarCross RefCross Ref
  58. Paul Taylor, Cary Funk and April Clark. 2007. Americans and social trust: Who, where and why. Pew Research Center. (2007). Available: http://www.pewsocialtrends.org/2007/02/22/americans-and-social-trust-who-where-and-why/Google ScholarGoogle Scholar
  59. Kim M Thompson, Paul T Jaeger, Natalie Greene Taylor, Mega Subramaniam and John Carlo Bertot. 2014. Digital literacy and digital inclusion: Information policy and the public library. Rowman & Littlefield. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Ola Hodne Titlestad, Knut Staring and Jørn Braa. 2009. Distributed development to enable user participation: Multilevel design in the HISP network. Scandinavian Journal of Information Systems, 21, 1 (2009), Article 3.Google ScholarGoogle Scholar
  61. Craig W Trumbo and Katherine A McComas. 2003. The function of credibility in information processing for risk perception. Risk Analysis, 23, 2 (2003), 343--353.Google ScholarGoogle ScholarCross RefCross Ref
  62. Alexander van Deursen, Ellen Helsper, Rebecca Eynon and Jan van Dijk. 2017. The compoundness and sequentiality of digital inequality. International Journal of Communication, 11 (2017), 452--473.Google ScholarGoogle Scholar
  63. Jan Van Dijk and Kenneth Hacker. 2003. The digital divide as a complex and dynamic phenomenon. The Information Society, 19, 4 (2003), 315--326.Google ScholarGoogle ScholarCross RefCross Ref
  64. Jan AGM Van Dijk. 2005. The deepening divide: Inequality in the information society. Sage Publications.Google ScholarGoogle Scholar
  65. Andreas Vårheim. 2011. Gracious space: Library programming strategies towards immigrants as tools in the creation of social capital. Library & Information Science Research, 33, 1 (2011), 12--18.Google ScholarGoogle ScholarCross RefCross Ref
  66. Andreas Vårheim. 2014. Trust in libraries and trust in most people: Social capital creation in the public library. The Library Quarterly, 84, 3 (2014), 258--277.Google ScholarGoogle ScholarCross RefCross Ref
  67. Aditya Vashistha, Richard Anderson, and Shrirang Mare. 2018. Examining security and privacy research in developing regions. COMPASS '18: ACM SIGCAS Conference on Computing and Sustainable Societies (Article No. 25). Menlo Park and San Jose, CA, USA. ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Jessica Vitak, Yuting Liao, Priya Kumar and Mega Subramaniam. 2018. Librarians as Information Intermediaries: Navigating Tensions Between Being Helpful and Being Liable. Proceedings of the 13th Annual iConference, Lecture Notes in Computer Science, vol 10766 (pp. 693--702). London: Springer.Google ScholarGoogle Scholar
  69. Jessica Vitak, Yuting Liao, Priya Kumar, Michael Zimmer, and Katie Kritikos. 2018. Privacy attitudes and data valuation among fitness tracker users. Proceedings of the 13th Annual iConference, Lecture Notes in Computer Science, vol 10766 (pp. 229--239). London: Springer.Google ScholarGoogle ScholarCross RefCross Ref
  70. Rick Wash. 2010. Folk models of home computer security. Proceedings of the Sixth Symposium on Usable Privacy and Security (Article No. 11). New York: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Rick Wash and Emilee Rader. 2011. Influencing mental models of security: a research agenda. Proceedings of the 2011 New Security Paradigms Workshop (pp. 57--66). New York: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Rick Wash and Emilee J Rader. 2015. Too much knowledge? security beliefs and protective behaviors among united states internet users. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (pp. 309--325). Usenix Association. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. 'I Knew It Was Too Good to Be True": The Challenges Economically Disadvantaged Internet Users Face in Assessing Trustworthiness, Avoiding Scams, and Developing Self-Efficacy Online

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Proceedings of the ACM on Human-Computer Interaction
      Proceedings of the ACM on Human-Computer Interaction  Volume 2, Issue CSCW
      November 2018
      4104 pages
      EISSN:2573-0142
      DOI:10.1145/3290265
      Issue’s Table of Contents

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 November 2018
      Published in pacmhci Volume 2, Issue CSCW

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader