Privacy and Security in the Brave New World: The Use of Multiple Mental Models

We live in a world where the flow of electronic information and communication has become a ubiquitous part of our everyday life. While our lives are enhanced in many ways, we also experience a myriad of challenges especially to our privacy and security. Survey data shows that the majority of people are 'very concerned' about privacy and security but that they don't always act in ways to protect their privacy. Our goal was to explore how participants understand and experience privacy and security as they engage in online activities. To that end we used a qualitative approach to understand the participants' mental models of online privacy and security. The data from our 40 interviews show that users have multiple mental models that guide their understanding of and experience with privacy and security. These mental models not only operate simultaneously but are rarely fully formed and often contradict each other.

[1]  L. Jean Camp,et al.  Mental Models of Security Risks , 2007, Financial Cryptography.

[2]  L. Hoffman Computers and Privacy in the Next Decade , 1980 .

[3]  Rick Wash,et al.  Organization Interfaces—collaborative computing General Terms , 2022 .

[4]  Kim Sheehan,et al.  Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..

[5]  Daniel J. Hruschka,et al.  Reliability in Coding Open-Ended Data: Lessons Learned from HIV Behavioral Research , 2004 .

[6]  ชวิตรา ตันติมาลา Constructing Grounded Theory: A Practical Guide through Qualitative Analysis , 2017 .

[7]  K. Charmaz,et al.  Constructing Grounded Theory: A practical guide through qualitative analysis Kathy Charmaz Constructing Grounded Theory: A practical guide through qualitative analysis Sage 224 £19.99 0761973532 0761973532 [Formula: see text]. , 2006, Nurse researcher.

[8]  L. Jean Camp,et al.  Mental Models of Computer Security Risks , 2007, WEIS.

[9]  David Hutton,et al.  Lessons Unlearnt: The (Human) Nature of Disaster Management , 2012 .

[10]  Ruth Urner,et al.  Naïve Security in a Wi-Fi World , 2010, IFIPTM.

[11]  L. Jean Camp,et al.  Mental models of privacy and security , 2009, IEEE Technology and Society Magazine.

[12]  Paul Dourish,et al.  Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena , 2006, Hum. Comput. Interact..

[13]  A. Clement,et al.  Situating Privacy Online , 2004 .

[14]  J. Rubenfeld The Right of Privacy , 1989 .

[15]  Yee-Yin Choong,et al.  Basing Cybersecurity Training on User Perceptions , 2012, IEEE Security & Privacy.

[16]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[17]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[18]  F. Schoeman,et al.  Philosophical Dimensions of Privacy , 1984 .