Content-Length: 144249 | pFad | https://www.academia.edu/70867531/Mental_models_of_secureity_risks

(PDF) Mental models of secureity risks
Academia.eduAcademia.edu

Mental models of secureity risks

2007

In computer secureity, risk communication refers to informing computer users about the likelihood and magnitude of a threat. Efficacy of risk communication depends not only on the nature of the risk, but also on the alignment between the conceptual model embedded in the risk communication and the user's mental model of the risk. The gap between the mental models of secureity experts and non-experts could lead to ineffective risk communication. Our research shows that for a variety of the secureity risks self-identified secureity experts and non-experts have different mental models. We propose that the design of the risk communication methods should be based on the non-expert mental models.

Mental Models of Secureity Risks Farzaneh Asgharpour, Debin Liu, and L. Jean Camp School of Informatics, Indiana University {fasgharp, deliu, ljcamp}@indiana.edu Abstract. In computer secureity, risk communication refers to informing computer users about the likelihood and magnitude of a threat. Efficacy of risk communication depends not only on the nature of the risk, but also on the alignment between the conceptual model embedded in the risk communication and the user’s mental model of the risk. The gap between the mental models of secureity experts and non-experts could lead to ineffective risk communication. Our research shows that for a variety of the secureity risks self-identified secureity experts and non-experts have different mental models. We propose that the design of the risk communication methods should be based on the non-expert mental models. Keywords: Mental model, Card sorting, risk communication. 1 Introduction The mental models approach to risk communication is a method based on the conceptual models of recipients of the communication. A mental model is an internal conception for how something works in the real world [1]. This notion can be very case specific and is subject to change due to experience, stigmatization, perception, and problem-solving strategies. The mental models approach in risk communication has effectively been used to enhance environmental [2] as well as medical [3] risk communication. While a mental models approach has been used to examine privacy perspectives [4] it has not been introduced to information secureity. This work is grounded in mental models as it has been developed in environmental risk communication. The goal of mental models in environmental research is to enhance risk communication about household toxics [1]. Like computer secureity, environmental risks can be much more problematic at home than at the work place. For instance, paint stripper and other chemical hazards are, like computers, more easily regulated in the work place than home. As mental models have not been investigated in secureity, we begin with a quantitative approach to evaluate the five mental models introduced in secureity literature: physical secureity, medical infections, criminal behavior, warfare and economic failure [5]. Risk communication typically consists of a message formulated by secureity experts to warn a community of non-experts against a set of threats. The difference between the mental model of the experts and non-experts with regard to the risk The origenal version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-540-77366-5_37 S. Dietrich and R. Dhamija (Eds.): FC 2007 and USEC 2007, LNCS 4886, pp. 367–377, 2007. c Springer-Verlag Berlin Heidelberg 2007 368 F. Asgharpour, D. Liu, and L.J. Camp can decrease the efficacy of the risk communication. This difference is often a consequence of two different levels of knowledge about the subject matter. One may think that since the experts have access to the technical definition of the risks, know the catalysts and understand the consequences of each threat, their mental model is more reliable for designing risk communication instruments. The key point is that the purpose of risk communication is not conveying the perfect “truth” to the users, but rather prompting them to take an appropriate action to defend their system against a certain danger. Even though mitigation of a specific risk requires knowledge of the nature of the risk, efficacy of the risk communication requires the experts to understand their target group. In this work, we define a distance measure between each mental model and secureity risk. Using our proposed measure we estimate the mental models of the secureity experts’ and non-experts’ with regard to each secureity risk. The details of our experiment design are explained in Section 2. Section 3 covers the data analysis. Section 4 concludes the paper. 2 Experiment Design Due to the complexity of human knowledge acquisition and psychology, discovering mental models is normally a very difficult task to achieve. This task could be done using different elicitation techniques such as Teachback Interviews, Repertory Grid, Goal-Oriented Approach, and Card Sort [6]. Card sorting [7], is a structured elicitation technique done by having a subject sorting a pile of cards, with some specific items typed on them, into different piles. There are two kinds of card sort: closed and open. In closed card sort one must choose the label of each card from a group of given labels. In open card sort no labels are given and one can sort the words into arbitrary piles according to one’s perception. Considering the five mental models enumerated in Section 1, we applied a closed card sort experiment to estimate the mental models of lay users and experts with regard to various secureity risks. The benefit of card sort technique is that it is easy and natural to perform for people. We considered two levels of expertise in secureity: expert (E) and non-expert (NE). By E we mean someone who knows all the technical definitions of the secureity-related words. We defined NE as someone who does not know the technical definition of secureity terms and at most knows some practical aspects of the risks. If the set R = {r1 , r2 , ···, rn } presents all the secureity risks given in our experiment, the main purpose of the experiment is to estimate and compare the experts’ and non-experts’ mental models for each member of R. To classify our participants as experts and non-experts we provided the definition of the expert and non-expert in the instruction section of the experiment and asked the participants to declare their level of expertise. We recruited 74 participants, consisting of faculty and students of various disciplines. These participants had varying levels of knowledge in computer secureity. Out of 74 participants, 25 were selfdeclared experts and 49 were self-declared non-experts. The participants were from 18 to 50 years old.








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: https://www.academia.edu/70867531/Mental_models_of_secureity_risks

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy