skip to main content
10.1145/1719030.1719050acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article

So long, and no thanks for the externalities: the rational rejection of security advice by users

Published:08 September 2009Publication History

ABSTRACT

It is often suggested that users are hopelessly lazy and unmotivated on security questions. They chose weak passwords, ignore security warnings, and are oblivious to certificates errors. We argue that users' rejection of the security advice they receive is entirely rational from an economic perspective. The advice offers to shield them from the direct costs of attacks, but burdens them with far greater indirect costs in the form of effort. Looking at various examples of security advice we find that the advice is complex and growing, but the benefit is largely speculative or moot. For example, much of the advice concerning passwords is outdated and does little to address actual treats, and fully 100% of certificate error warnings appear to be false positives. Further, if users spent even a minute a day reading URLs to avoid phishing, the cost (in terms of user time) would be two orders of magnitude greater than all phishing losses. Thus we find that most security advice simply offers a poor cost-benefit tradeoff to users and is rejected. Security advice is a daily burden, applied to the whole population, while an upper bound on the benefit is the harm suffered by the fraction that become victims annually. When that fraction is small, designing security advice that is beneficial is very hard. For example, it makes little sense to burden all users with a daily task to spare 0.01% of them a modest annual pain.

References

  1. http://isc.sans.org/survivaltime.html.Google ScholarGoogle Scholar
  2. http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks.Google ScholarGoogle Scholar
  3. http://www.theregister.co.uk/2005/07/19/password_schneier/.Google ScholarGoogle Scholar
  4. http://www.schneier.com/blog/archives/2005/06/write_down_your.html.Google ScholarGoogle Scholar
  5. http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1256995,00.html.Google ScholarGoogle Scholar
  6. http://www.readwriteweb.com/archives/will_mainstream_users_ever_learn.php.Google ScholarGoogle Scholar
  7. http://www.phishtank.com.Google ScholarGoogle Scholar
  8. http://www.securitycartoon.com.Google ScholarGoogle Scholar
  9. Making Waves in the Phishers Safest Harbor: Exposing the Dark Side of Subdomain Registries. http://www.antiphishing.org/reports/APWG_Advisory_on_Subdomain_Registries.pdf.Google ScholarGoogle Scholar
  10. Phishers get more wily as cybercrime grows. http://www.reuters.com/article/technologyNews/idUSTRE53G01620090417?feedType=RSS&feedName=technologyNews.Google ScholarGoogle Scholar
  11. Regulation E of the Federal Reserve Board. http://ecfr.gpoaccess.gov/cgi/t/text/text-idx?c=ecfr&sid=0283a311c8b13f29f284816d4dc5aeb7&rgn=div9&view=text&node=12: 2.0.1.1.6.0.3.19.14&idno=12.Google ScholarGoogle Scholar
  12. The Fidelity Customer Protection Guarantee. http://personal.fidelity.com/accounts/services/findanswer/content/security.shtml.cvsr?refpr=custopq11.Google ScholarGoogle Scholar
  13. US-Cyber Emergency Response Readiness Team: CyberSecurity Tips. http://www.us-cert.gov/cas/tips/.Google ScholarGoogle Scholar
  14. Wells Fargo News Release, Jan 1, 2009. https://www.wellsfargo.com/press/2009/20090101_Wachovia_Merger.Google ScholarGoogle Scholar
  15. Wells Fargo: Online Security Guarantee. https://www.wellsfargo.com/privacy_security/online/guarantee.Google ScholarGoogle Scholar
  16. Wired: Weak Password Brings 'Happiness' to Twitter Hacker. http://blog.wired.com/27bstroke6/2009/01/professed-twitt.html.Google ScholarGoogle Scholar
  17. Department of Defense Password Management Guideline. Technical Report CSC-STD-002-85, U.S. Dept. of Defense, Computer Security Center, 1985.Google ScholarGoogle Scholar
  18. A. Acquisti and J. Grossklags. Uncertainty, Ambiguity and Privacy. WEIS, 2005.Google ScholarGoogle Scholar
  19. A. Beautement, M.A. Sasse and M. Wonham. The Compliance Budget: Managing Security Behaviour in Organisations. NSPW, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Ozment and S. Schecter. Milk or wine: does software security improve with age? Usenix Security, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Adams and M.A. Sasse. Users Are Not the Enemy. Commun. ACM, 42(12), 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Jackson, D.R. Simon, D.S. Tan and A. Barth. An Evaluation of Extended Validation Certificates and Picture-in-Picture Phishing Attacks. Proc. Usable Security, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. Dhamija and J.D. Tygar. The battle against phishing: Dynamic security skins. Symp. on Usable Privacy and Security, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. Dhamija, J.D. Tygar, and M. Hearst. Why phishing works. CHI, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. D.W. Stewart and I.M. Martin. Intended and Unintended Consequences of Warning Messages: A Review and Syntheis of Empirical Research. J. of Public Policy and Marketing, 1994.Google ScholarGoogle Scholar
  26. D. Florêncio and C. Herley. A Large-Scale Study of Web Password Habits. WWW 2007, Banff. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Florêncio, C. Herley, and B. Coskun. Do Strong Web Passwords Accomplish Anything? Proc. Usenix Hot Topics in Security, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. C. Herley and D. Florêncio. A Profitless Endeavor: Phishing as Tragedy of the Commons. NSPW 2008, Lake Tahoe, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. C. Herley and D. Florêncio. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy. WEIS 2009, London.Google ScholarGoogle Scholar
  30. J. Sobey, R. Biddle, P.C. van Oorschot and A.S. Patrick. Exploring User Reactions to New Browser Cues for Extended Validation Certificates. ESORICS, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri and L.F. Cronor. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. Usenix Security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G.M. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the 15th ACM Conference on Computer and Communications Security, pages 3--14, Alexandria, Virginia, USA, October 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. M.E. Zurko. User-Centered Security: Stepping Up to the Grand Challenge. ACSAC, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. M.J. Freedman and E. Freuenthal and D. Mazières. Democratizing Content Publication with Coral. NSDI, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Jakobsson, A. Tsow, A. Shah, E. Blevis and Y-K Lim. What Instills Trust? A Qualitative Study of Phishing. Proc. Usable Security, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. M. Mannan and P.C. van Oorschot. Security and Usability: The Gap in Real-World Online Banking. NSPW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Z. Mao and C. Herley. A Robust Link-Translating Proxy Mirroring the Whole Web. ACM SAC 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. M.E. Zurko and R.T. Simon. User-Centered Security. NSPW, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. N.G. Mankiw. Principles of Economics. 4-th ed., 2007.Google ScholarGoogle Scholar
  40. P. Kumaraguru, S. Sheng, A. Acquisti, L.F. Cranor, J. Hong. Testing PhishGuru in the Real World. SOUPS, 2007.Google ScholarGoogle Scholar
  41. R. Anderson. Why Cryptosystems Fail. In Proc. CCS, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. R. Anderson. Why Information Security is Hard. In Proc. ACSAC, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. R. Anderson. Security Engineering. In Second ed., 2008.Google ScholarGoogle Scholar
  44. R. Anderson and T. Moore. The Economics of Information Security. Science Magazine, 2006.Google ScholarGoogle Scholar
  45. R. Morris and K. Thompson. Password Security: A Case History. Comm. ACM, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. S. Bellovin. Security by Checklist. IEEE Security & Privacy Mag., 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. S. Egelman, L.F. Cronor and J. Hong. You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. CHI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. S. Schechter, R. Dhamija, A. Ozment, I. Fischer. The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies. IEEE Security & Privacy, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. S.J. Greenwald, K.G. Oltho, V. Raskin and W. Ruch. The User Non-Acceptance Paradigm: INFOSEC's Dirty Little Secret. NSPW, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. T. Moore and R. Clayton. Examining the Impact of Website Take-down on Phishing. Proc. APWG eCrime Summit, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. T.S. Kuhn. The Structure of Scientific Revolutions. 1962.Google ScholarGoogle Scholar
  52. V. Anandpara, A. Dingman, M. Jakobsson, D. Liu, and H. Roinestad. Phishing IQ Tests Measure Fear, Not Ability. Proc. Financial Crypto, 2007.Google ScholarGoogle Scholar
  53. M. Wu, R. Miller, and S.L. Garfinkel. Do Security Toolbars Actually Prevent Phishing Attacks. CHI, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. So long, and no thanks for the externalities: the rational rejection of security advice by users

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      NSPW '09: Proceedings of the 2009 workshop on New security paradigms workshop
      September 2009
      156 pages
      ISBN:9781605588452
      DOI:10.1145/1719030

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 September 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate62of170submissions,36%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader