Advertisement

A Comparison of American and German Folk Models of Home Computer Security

  • Michaela Kauer
  • Sebastian Günther
  • Daniel Storck
  • Melanie Volkamer
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8030)

Abstract

Although many security solutions exist, home computer systems are vulnerable against different type of attacks. The main reason is that users are either not motivated to use these solutions or not able to correctly use them. In order to make security software more usable and hence computers more secure, we re-ran the study by Wash about “Folk Models of Home Computer Security” in Germany. We classified the different mental models in eleven folk models. Eight of the identified folk models are similar to the models Wash presented. We describe each folk model and illustrate how users think about computer security.

Keywords

(ACM classification)H.5.2 Information Interfaces and Presentation: User Interfaces evaluation/methodology user-centered design H.5.3 Information Interfaces and Presentation: Group and Organization Interfaces collaborative computing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Asgharpour, F., Liu, D., Camp, L.J.: Mental models of computer security risks. In: Workshop on the Economics of Information Security (WEIS) (2007)Google Scholar
  2. 2.
    Balfanz, D., Durfee, G., Smetters, D.K., Grinter, R.E.: In Search of Usable Security: Five Lessons from the Field. In: IEEE Security & Privacy, pp. 19–24 (2004)Google Scholar
  3. 3.
    Camp, L.J., Wolfram, C.: Pricing security. In: Proc. of the Information Survivability Workshop (2000)Google Scholar
  4. 4.
    Hudson, K., Herr, T., Blanche, A., Cross, A.: The european union and internet data privacy. Politics & Policy publication, http://politicsandpolicy.org/article/european-union-and-internet-data-privacy
  5. 5.
    Johnson-Laird, P., Girotto, V., Legrenzi, P.: Mental models: a gentle guide for outsiders (1998), http://icos.groups.si.umich.edu/gentleintro.html
  6. 6.
    Liu, D., Asgharpour, F., Camp, L.J.: Risk communication in Security Using Mental Models (2008)Google Scholar
  7. 7.
    Raja, F., Hawkey, K., Beznosov, K.: Revealing Hidden Context: Improving Mental Models of Personal Firewall Users. In: Proc. of the fifth Symposium on Usable Privacy and Security, SOUPS 2009, Mountainview, CA, USA, July 15-17, pp. 1:1–1:12 (2009)Google Scholar
  8. 8.
    Wash, R.: Folk models of home computer security. In: Proc. of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, New York, NY, USA, pp. 11:1–11:16 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Michaela Kauer
    • 1
  • Sebastian Günther
    • 1
  • Daniel Storck
    • 1
  • Melanie Volkamer
    • 1
  1. 1.Institute of ErgonomicsTechnische Universität DarmstadtGermany

Personalised recommendations