The Role of Social Influence in Security Feature Adoption

Social influence is key in technology adoption, but its role in security-feature adoption is unique and remains unclear. Here, we analyzed how three Facebook security features' Login Approvals, Login Notifications, and Trusted Contacts-diffused through the social networks of 1.5 million people. Our results suggest that social influence affects one's likelihood to adopt a security feature, but its effect varies based on the observability of the feature, the current feature adoption rate among a potential adopter's friends, and the number of distinct social circles from which those feature-adopting friends originate. Curiously, there may be a threshold higher than which having more security feature adopting friends predicts for higher adoption likelihood, but below which having more feature-adopting friends predicts for lower adoption likelihood. Furthermore, the magnitude of this threshold is modulated by the attributes of a feature-features that are more noticeable (Login Approvals, Trusted Contacts) have lower thresholds.

[1]  Eric Sun,et al.  Gesundheit! Modeling Contagion through Facebook News Feed , 2009, ICWSM.

[2]  Damon Centola,et al.  The Spread of Behavior in an Online Social Network Experiment , 2010, Science.

[3]  D. Rubin,et al.  The central role of the propensity score in observational studies for causal effects , 1983 .

[4]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[5]  M. Angela Sasse,et al.  Users are not the enemy , 1999, CACM.

[6]  Cosma Rohilla Shalizi,et al.  Homophily and Contagion Are Generically Confounded in Observational Social Network Studies , 2010, Sociological methods & research.

[7]  Rick Wash,et al.  Stories as informal lessons about security , 2012, SOUPS.

[8]  Arun Sundararajan,et al.  Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks , 2009, Proceedings of the National Academy of Sciences.

[9]  Damon Centola Damon Centola Behavior An Experimental Study of Homophily in the Adoption of Health , 2011 .

[10]  Martina Angela Sasse,et al.  Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery , 2003 .

[11]  Damon Centola An Experimental Study of Homophily in the Adoption of Health Behavior , 2011, Science.

[12]  Lada A. Adamic,et al.  The role of social networks in information diffusion , 2012, WWW.

[13]  Noah J. Goldstein,et al.  The Constructive, Destructive, and Reconstructive Power of Social Norms , 2007, Psychological science.

[14]  A Bandura,et al.  Vicarious extinction of avoidance behavior. , 1967, Journal of personality and social psychology.

[15]  Jon Kleinberg,et al.  Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter , 2011, WWW.

[16]  Adam D. I. Kramer The spread of emotion via facebook , 2012, CHI.

[17]  M. Macy,et al.  Complex Contagions and the Weakness of Long Ties1 , 2007, American Journal of Sociology.

[18]  Cormac Herley,et al.  So long, and no thanks for the externalities: the rational rejection of security advice by users , 2009, NSPW '09.

[19]  Cameron Marlow,et al.  A 61-million-person experiment in social influence and political mobilization , 2012, Nature.

[20]  S. Milgram,et al.  Note on the drawing power of crowds of different size. , 1969 .

[21]  Noah J. Goldstein,et al.  A Room with a Viewpoint: Using Social Norms to Motivate Environmental Conservation in Hotels , 2008 .

[22]  L. J. Chapman Illusory correlation in observational report. , 1967 .

[23]  Jie Gao,et al.  Complex contagion and the weakness of long ties in social networks: revisited , 2013, EC '13.

[24]  Laura A. Dabbish,et al.  The Effect of Social Influence on Security Sensitivity , 2014, SOUPS.

[25]  Edward W. Felten,et al.  Secrecy, flagging, and paranoia: adoption criteria in encrypted email , 2006, CHI.

[26]  Lars Backstrom,et al.  Structural diversity in social contagion , 2012, Proceedings of the National Academy of Sciences.

[27]  Nicholas A. Christakis,et al.  Cooperative behavior cascades in human social networks , 2009, Proceedings of the National Academy of Sciences.

[28]  Daniel Kahneman,et al.  Availability: A heuristic for judging frequency and probability , 1973 .