User Security Behavior Denise Anthony PKI Unlocked Summit Dartmouth College July 2004.

Slides:



Advertisements
Similar presentations
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Advertisements

Information Technology Awareness Wayne Donald IT Security Officer.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Background This report summarizes research to understand consumer comprehension and opinions of online privacy protection. This research was conducted.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Inbound Statistics Slides Attract. 1 Blogging There are 31% more bloggers today than there were three years ago 46% of people read blogs more than once.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Information about the computer By Sophia and Christina C.
Online Shopping Take Charge of Your Finances
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
Certificate Authority Security Council (CASC) 2015 Consumer Trust Survey.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
By Cindy Garrett.  Section A – Netiquette  Section B- Copyright and Fair Use  Section C- Plagiarism  Section D- Safety on the Web  Section E- Safety.
PKI in Higher Education: Dartmouth PKI Lab Update Internet2 Virtual Meeting 5 October 2001.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
This work was supported by the TRUST Center (NSF award number CCF ) Introduction In 1995 Mary J. Culnan stated that ‘fair information practices.
Direct and Online Marketing: The New Marketing Model
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Staying Safe Online Keep your Information Secure.
Toward An Ethical World... Responsible Internet Citizenship: Safety, Security, & Scholarship Rodney J. Petersen Policy Analyst and Security Task Force.
Internet Security for Small & Medium Business Week 6
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Using A presentation of the Elmhurst Public Library.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Protecting Students on the School Computer Network Enfield High School.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
CCT355H5 F Presentation: Phishing November Jennifer Li.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Future of Privacy Forum “Icon”Survey: Online Behavioral Advertising & Privacy Final Results Prepared by Mary J. Culnan Bentley University.
Small Business Security Keith Slagle April 24, 2007.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Get Safe Online Expert advice for everyone In association with.
Protecting Your Computer By: Victoria Tuttle. There’s never enough you can do to protect your computer.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Public Relations and the Net Moving into the World of Cyberspace.
Internet Safety By. Connor G. Passwords  Never share your password online to strangers.  A password should be a combination of letters and numbers.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Behavioral Advertising Privacy, Consumer Attitudes and Best Practices Carolyn Hodge, VP of Communications, TRUSTe David W. Stark CIPP, VP & North America.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Robert Crawford, MBA West Middle School.  Describe ways criminals obtain passwords  Discuss ways to protect your computer from being accessed by others.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
BY CONOR DALY Public Trust Online. What is E-commerce? The buying and selling of products and services by businesses and consumers through an electronic.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Hotspot Shield Protect Your Online Identity
Privacy or Security Are they the same?
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Presentation transcript:

User Security Behavior Denise Anthony PKI Unlocked Summit Dartmouth College July 2004

Computer Networks Collective resource systems Produced and maintained by multiple actors; Individual behavior effects integrity of system virus exposure unauthorized access Feels like consuming a private good

User surveys Dartmouth students: April 2003: Computer use and security behavior –Representative sample of 171 undergrads –Method: on-line survey November 2003: Use of Wireless and Wired networks –Total of 247 undergraduate and graduate students –Method: paper survey –Conducted by student Emiliano Trere from University of Bologna in Italy 20 in-depth interviews Nationally representative data from UCLA Center for Communication Policy

Dartmouth Students

Basic Use Statistics 99% use daily –~95% use home-grown Blitzmail program –Primary medium of communication on campus 70% browse the Web at least 1 hour/day 67% P2P file-sharing in average week 90% purchased on-line in last 6 months 78% use both wired and wireless networks – Over 2/3 use wireless on almost daily basis – 22% no wireless: lack of technology, seniors

Virus Protection 87% have anti-virus software loaded on their computer –2/3 of them scan for viruses at least once per month –About 40% up-date their anti-virus software at least once per month

Password Security 75% have shared their password – Over 50% did NOT change it afterward Nearly two-thirds never change password 36% use same password for all apps/sites – all websites that require password – no distinction between secure (SSL) and non- secure websites

Behavior across networks

Security Concerns About half concerned about PRIVACY on WWW More than half concerned about SECURITY of information on WWW

Web security? How do users think about website security? Implicit trust and experience “If [a website] mention[s] they are secure…I usually trust it.” “I don’t really think about it, but when the windows pop up saying I should do something, I always say yes.” “All the websites I use are secure, and everyone else is doing it [without] a problem.”

Web security How do users think about website security? Use brand name sites - reputation “I just order from Amazon and places like that.” “I use it if it is an official site of a major company.” “I would never order stuff off a website that looks like its program could change…you know, a crappy website.” “I trust Norton to do it for me.”

Security Behavior Online How often check browser security signals when submitting sensitive information?

Security Features Used

Link between concern and behavior

How concerned are users? 2002 National data (UCLA): 54% very/extremely concerned about privacy when purchasing online –11.2% not at all (up from 5.5%) Non-purchasers (58%) more concerned than purchasers (33%) New users (65%) more concerned than experienced users (47%) Methods to reduce concerns: 23% Nothing! 6% better technology 27% guarantee/3 rd party verification/Gov regulation

Implications Not evaluating security of websites –Don’t use security signals Don’t know what to look for –Engage in un-secure behavior Users already ‘trust’ infrastructure –Rely on reputation of company –Expectation that technology is secure Want ‘assurance’ that system works –Third party incentives/regulation of security