Skip to main content

Risk Communication Design: Video vs. Text

  • Conference paper
Privacy Enhancing Technologies (PETS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7384))

Included in the following conference series:

Abstract

There are significant differences between older and younger adults in terms of risk perception and risk behaviors offline. The previously unexplored existence of this dissimilitude online is the motivation for our work. What are the risk perceptions of older adults? How are these correlated with the classic dimensions of risk perception offline? Can we leverage episodic memory, particularly relevant for older adults, to increase the efficacy of risk communication? We conduct a survey based experiment with two groups: video (n=136) and text (113). We find that leveraging episodic memory using video risk communication can improve the ability of elders to avoid phishing attacks and downloading malware. The applicability of the dimensions of risk were different based not only the risk but also the mode of risk communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Conference on Electronic Commerce, pp. 21–29. ACM (2004)

    Google Scholar 

  2. Acquisti, A.: Nudging privacy: The behavioral economics of personal information. IEEE Security & Privacy 7(6), 82–85 (2009)

    Article  Google Scholar 

  3. Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Security & Privacy 3(1), 26–33 (2005)

    Article  Google Scholar 

  4. Anderson, K.: Consumer fraud in the United States: An FTC survey. Federal Trade Commission (2004)

    Google Scholar 

  5. Anderson, N., Craik, F.: Memory in the aging brain. The Oxford Handbook of Memory, 411–425 (2000)

    Google Scholar 

  6. Asgharpour, F., Liu, D., Camp, L.J.: Mental Models of Security Risks. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 367–377. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Aslan, A., Bäuml, K.H., Pastötter, B.: No inhibitory deficit in older adults’ episodic memory. Psychological Science 18(1), 72 (2007)

    Article  Google Scholar 

  8. Bachman, K.: Study: Internet user adoption of dnt hard to predict. Tech. rep., AdWeek (March 2012), http://www.adweek.com/news/technology/study-internet-user-adoption-dnt-hard-predict-139091

  9. Bernstein, P.: Against the gods: The remarkable story of risk. John Wiley & Sons Inc. (1998)

    Google Scholar 

  10. Bertoni, D.: Identity Theft: Governments Have Acted to Protect Personally Identifiable Information, But Vulnerabilities Remain: Congressional Testimony. DIANE Publishing (2009)

    Google Scholar 

  11. Bonneau, J., Preibusch, S.: The privacy jungle: On the market for data protection in social networks. Economics of Information Security and Privacy, 121–167 (2010)

    Google Scholar 

  12. Brandimarte, L., Acquisti, A., Loewenstein, G.: Misplaced confidences: Privacy and the control paradox. In: Workshop of Economics and Information Security (WEIS). Harvard University (2010)

    Google Scholar 

  13. Breau, C.: Projected population of the united states, by age and sex: 2000 to 2050. Tech. rep., U. S. Census Bureau (2000), http://www.census.gov/population/www/projections/usinterimproj/

  14. Brodie, C., Karat, C.M., Karat, J., Feng, J.: Usable security and privacy: a case study of developing privacy management tools. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS 2005, pp. 35–43. ACM, New York (2005)

    Chapter  Google Scholar 

  15. Camp, L.J.: Reliable, usable signaling to defeat masquerade attacks. ISJLP 3, 211 (2007)

    Google Scholar 

  16. Camp, L.J.: Mental models of privacy and security. IEEE Technology and Society Magazine 28(3), 37–46 (2009)

    Article  Google Scholar 

  17. Camp, L., McGrath, C., Genkina, A.: Security and morality: A tale of user deceit. In: Models of Trust for the Web (MTW 2006), Edinburgh, Scotland, vol. 22 (2006)

    Google Scholar 

  18. Clark, J., Van Oorschot, P., Adams, C.: Usability of anonymous web browsing: an examination of Tor interfaces and deployability. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 41–51. ACM (2007)

    Google Scholar 

  19. Cranor, L., Garfinkel, S.: Security and usability: Designing secure systems that people can use. O’Reilly Media, Inc. (2005)

    Google Scholar 

  20. Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and the network effect. In: Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK (June 2006)

    Google Scholar 

  21. Farahmand, F., Spafford, E.H.: Understanding insiders: An analysis of risk-taking behavior. Information Systems Frontiers, 1–11 (2010)

    Google Scholar 

  22. Fischhoff, B., Slovic, P., Lichtenstein, S., Read, S., Combs, B.: How safe is safe enough? a psychometric study of attitudes towards technological risks and benefits. Policy Sciences 9(2), 127–152 (1978)

    Article  Google Scholar 

  23. Fisk, A.D., Rogers, W.A., Charness, N., Sharit, J.: Designing for older adults: Principles and creative human factors approaches, vol. 2. CRC (2009)

    Google Scholar 

  24. Flynn, J., Slovic, P., Mertz, C.K.: Gender, race, and perception of environmental health risks. Risk Analysis 14(6), 1101–1108 (1994)

    Article  Google Scholar 

  25. Garg, V., Camp, L.J.: End user perception of online risk under uncertainty. In: 45th Hawaii International Conference on System Sciences. IEEE (2012)

    Google Scholar 

  26. Garg, V., Camp, L.J.: Heuristics and biases: Implications for security and privacy (2012), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1933957

  27. Garg, V., Camp, L.J., Lorenzen-Huber, L.M., Connelly, K.: Risk communication design for older adults. In: ISG*ISARC 2012. International Society for Gerontechnology (in press, 2012)

    Google Scholar 

  28. Gürses, S., Berendt, B.: Pets in the surveillance society: A critical review of the potentials and limitations of the privacy as confidentiality paradigm. Data Protection in a Profiled World, 301–321 (2010)

    Google Scholar 

  29. Hasher, L., Stoltzfus, E., Zacks, R., Rypma, B.: Age and inhibition. Journal of Experimental Psychology: Learning, Memory, and Cognition 17(1), 163–169 (1991)

    Article  Google Scholar 

  30. Herron, C., York, H., Corrie, C., Cole, S.: A comparison study of the effects of a story-based video instructional package versus a text-based instructional package in the intermediate-level foreign language classroom. Calico Journal 23(2), 281 (2006)

    Google Scholar 

  31. Hoofnagle, C.J., King, J., Li, S., Turow, J.: How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies? SSRN eLibrary (2010)

    Google Scholar 

  32. Johnson, B.B., Slovic, P.: Presenting uncertainty in health risk assessment: initial studies of its effects on risk perception and trust. Risk Analysis 15(4), 485–494 (1995)

    Article  Google Scholar 

  33. Jonah, B.A., Thiessen, R., Au-Yeung, E.: Sensation seeking, risky driving and behavioral adaptation. Accident Analysis & Prevention 33(5), 679–684 (2001)

    Article  Google Scholar 

  34. Kahneman, D., Frederick, S.: Representativeness revisited: Attribute substitution in intuitive judgment. Heuristics and Biases: The Psychology of Intuitive Judgment, 49–81 (2002)

    Google Scholar 

  35. Lövdén, M., Rönnlund, M., Wahlin, Å., Bäckman, L., Nyberg, L., Nilsson, L.G.: The extent of stability and change in episodic and semantic memory in old age: Demographic predictors of level and change. The Journals of Gerontology Series B: Psychological Sciences and Social Sciences 59(3), 130 (2004)

    Article  Google Scholar 

  36. Nissenbaum, H.F.: Privacy in context: Technology, policy, and the integrity of social life. Stanford Law & Politics (2010)

    Google Scholar 

  37. Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41(1), 100–126 (2007)

    Article  Google Scholar 

  38. Phelps, J., Nowak, G., Ferrell, E.: Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 27–41 (2000)

    Google Scholar 

  39. Posner, R.A.: Right of privacy, the. Ga. L. Rev. 12, 393 (1977)

    Google Scholar 

  40. Posner, R.A.: The economics of privacy. The American Economic Review 71(2), 405–409 (1981)

    Google Scholar 

  41. Schneier, B.: The psychology of security. Communications of the ACM 50(5), 128 (2007)

    Article  Google Scholar 

  42. Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L., Hong, J., Nunge, E.: Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 88–99. ACM (2007)

    Google Scholar 

  43. Sherman, S.J.: On the self-erasing nature of errors of prediction. Journal of Personality and Social Psychology 39(2), 211–221 (1980)

    Article  Google Scholar 

  44. Sloman, S.A.: The empirical case for two systems of reasoning. Psychological Bulletin 119(1), 3 (1996)

    Article  Google Scholar 

  45. Smetters, D.K., Grinter, R.E.: Moving from the design of usable security technologies to the design of useful secure applications. In: Proceedings of the 2002 Workshop on New Security Paradigms, NSPW 2002, pp. 82–89. ACM, New York (2002)

    Chapter  Google Scholar 

  46. Spencer, W.D., Raz, N.: Differential effects of aging on memory for content and context: A meta-analysis. Psychology and Aging 10(4), 527 (1995)

    Article  Google Scholar 

  47. Tulving, E.: What is episodic memory? Current Directions in Psychological Science 2(3), 67–70 (1993)

    Article  Google Scholar 

  48. Tversky, A., Kahneman, D.: Judgment under uncertainty: Heuristics and biases. Science 185(4157), 1124 (1974)

    Article  Google Scholar 

  49. Wang, Y., Komanduri, S., Leon, P., Norcie, G., Acquisti, A., Cranor, L.: I regretted the minute I pressed share.: A qualitative study of regrets on Facebook. In: Symposium on Usable Privacy and Security (2011)

    Google Scholar 

  50. Whitten, A., Tygar, J.: Why Johnny cant encrypt: A usability evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium, vol. 99 (1999)

    Google Scholar 

  51. Wild, K., Boise, L., Lundell, J., Foucek, A.: Unobtrusive in-home monitoring of cognitive and physical health: Reactions and perceptions of older adults. Journal of Applied Gerontology 27(2), 181–200 (2008)

    Article  Google Scholar 

  52. Willis, S., Schaie, K., Martin, M.: Cognitive plasticity. Handbook of Theories of Aging, 295–322 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Garg, V., Camp, L.J., Connelly, K., Lorenzen-Huber, L. (2012). Risk Communication Design: Video vs. Text. In: Fischer-Hübner, S., Wright, M. (eds) Privacy Enhancing Technologies. PETS 2012. Lecture Notes in Computer Science, vol 7384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31680-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31680-7_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31679-1

  • Online ISBN: 978-3-642-31680-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics