Skip to main content
Top

2022 | OriginalPaper | Chapter

Security Mental Models and Personal Security Practices of Internet Users in Africa

Authors : Enock Samuel Mbewe, Josiah Chavula

Published in: e-Infrastructure and e-Services for Developing Countries

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recent trends show an increase in risks for personal cyberattacks, in part due to an increase in remote work that has been imposed by worldwide Covid-19 lockdowns. These attacks have further exposed the inefficiencies of the paternalistic design of Internet security systems and security configuration frameworks. Prior research has shown that users often have inadequate Internet security and privacy mental models. However, little is known about the causes of flawed mental models. Using mixed methods over a period of nine months, we investigate Internet security mental models of users in Africa and the implications of these mental models on personal security practice. Consistent with prior research, we find inadequate Internet security mental models in self-reported expert and non-expert Internet users. In addition, our mental modelling and task analysis reveal that the flawed security practice does not only result from users’ negligence, but also from lack of sufficient Internet security knowledge. Our findings motivate for reinforcing users’ Internet security mental models through personalised security configuration frameworks to allow users, especially those with limited technical skills, to easily configure their desired security levels.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Alozie, N.O., Akpan-Obong, P.: The digital gender divide: confronting obstacles to women’s development in Africa. Dev. Policy Rev. 35(2), 137–160 (2017)CrossRef Alozie, N.O., Akpan-Obong, P.: The digital gender divide: confronting obstacles to women’s development in Africa. Dev. Policy Rev. 35(2), 137–160 (2017)CrossRef
4.
go back to reference Antonio, A., Tuffley, D.: The gender digital divide in developing countries. Future Internet 6(4), 673–687 (2014)CrossRef Antonio, A., Tuffley, D.: The gender digital divide in developing countries. Future Internet 6(4), 673–687 (2014)CrossRef
6.
go back to reference Bernardini, S.: Think-aloud protocols in translation research: achievements, limits, future prospects. Target. Int. J. Transl. Stud. 13(2), 241–263 (2001)CrossRef Bernardini, S.: Think-aloud protocols in translation research: achievements, limits, future prospects. Target. Int. J. Transl. Stud. 13(2), 241–263 (2001)CrossRef
7.
go back to reference Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S.: Bridging the gap in computer security warnings: a mental model approach. IEEE Secur. Privacy 9(2), 18–26 (2010)CrossRef Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S.: Bridging the gap in computer security warnings: a mental model approach. IEEE Secur. Privacy 9(2), 18–26 (2010)CrossRef
8.
go back to reference Camerer, C., Issacharoff, S., Loewenstein, G., O’donoghue, T., Rabin, M.: Regulation for conservatives: behavioral economics and the case for “asymmetric paternalism”. Univ. Pa. Law Rev. 151(3), 1211–1254 (2003) Camerer, C., Issacharoff, S., Loewenstein, G., O’donoghue, T., Rabin, M.: Regulation for conservatives: behavioral economics and the case for “asymmetric paternalism”. Univ. Pa. Law Rev. 151(3), 1211–1254 (2003)
9.
go back to reference Craik, K.J.W.: The Nature of Explanation, vol. 445. CUP Archive (1952) Craik, K.J.W.: The Nature of Explanation, vol. 445. CUP Archive (1952)
10.
go back to reference Cranor, L.F.: A framework for reasoning about the human in the loop. In: Usability, Psychology, and Security, UPSEC 2008 (2008) Cranor, L.F.: A framework for reasoning about the human in the loop. In: Usability, Psychology, and Security, UPSEC 2008 (2008)
11.
go back to reference Lorrie Faith Cranor and Norbou Buchler: Better together: usability and security go hand in hand. IEEE Secur. Priv. 12(6), 89–93 (2014)CrossRef Lorrie Faith Cranor and Norbou Buchler: Better together: usability and security go hand in hand. IEEE Secur. Priv. 12(6), 89–93 (2014)CrossRef
12.
go back to reference Cranor, L.F., Garfinkel, S.: Security and Usability: Designing Secure Systems that People Can Use. O’Reilly Media, Inc., Sebastopol (2005) Cranor, L.F., Garfinkel, S.: Security and Usability: Designing Secure Systems that People Can Use. O’Reilly Media, Inc., Sebastopol (2005)
13.
go back to reference Dodd-McCue, D., Tartaglia, A.: Self-report response bias: learning how to live with its diagnosis in chaplaincy research. Chaplain. Today 26(1), 2–8 (2010)CrossRef Dodd-McCue, D., Tartaglia, A.: Self-report response bias: learning how to live with its diagnosis in chaplaincy research. Chaplain. Today 26(1), 2–8 (2010)CrossRef
14.
go back to reference Edwards, W.K., Poole, E.S., Stoll, J.: Security automation considered harmful? In: Proceedings of the 2007 Workshop on New Security Paradigms, pp. 33–42 (2008) Edwards, W.K., Poole, E.S., Stoll, J.: Security automation considered harmful? In: Proceedings of the 2007 Workshop on New Security Paradigms, pp. 33–42 (2008)
16.
go back to reference Flechais, I., Riegelsberger, J., Sasse, M.A.: Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems. In: Proceedings of the 2005 Workshop on New Security Paradigms, pp. 33–41 (2005) Flechais, I., Riegelsberger, J., Sasse, M.A.: Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems. In: Proceedings of the 2005 Workshop on New Security Paradigms, pp. 33–41 (2005)
17.
go back to reference Gentner, D., Stevens, A.L.: Mental Models. Psychology Press, Abingdon (2014)CrossRef Gentner, D., Stevens, A.L.: Mental Models. Psychology Press, Abingdon (2014)CrossRef
18.
go back to reference Nina Gerber, Paul Gerber, and Melanie Volkamer. Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77, 226–261 (2018). ISSN 01674048 Nina Gerber, Paul Gerber, and Melanie Volkamer. Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77, 226–261 (2018). ISSN 01674048
19.
go back to reference Pelle Guldborg Hansen: The definition of nudge and libertarian paternalism: does the hand fit the glove? Eur. J. Risk Regul. 7(1), 155–174 (2016)CrossRef Pelle Guldborg Hansen: The definition of nudge and libertarian paternalism: does the hand fit the glove? Eur. J. Risk Regul. 7(1), 155–174 (2016)CrossRef
20.
go back to reference Ion, I., Reeder, R., Consolvo, S.: “...No one can hack my mind”: comparing expert and non-expert security practices. In: SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security, pp. 327–346 (2019) Ion, I., Reeder, R., Consolvo, S.: “...No one can hack my mind”: comparing expert and non-expert security practices. In: SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security, pp. 327–346 (2019)
21.
go back to reference Jääskeläinen, R.: Think-aloud protocol. In: Handbook of Translation Studies, vol. 1, pp. 371–374 (2010) Jääskeläinen, R.: Think-aloud protocol. In: Handbook of Translation Studies, vol. 1, pp. 371–374 (2010)
22.
go back to reference Jackson, L.A., Zhao, Y., Kolenic III, A., Fitzgerald, H.E., Harold, R., Eye, A.V.: Race, gender, and information technology use: the new digital divide. CyberPsychology Behav. 11(4), 437–442 (2008) Jackson, L.A., Zhao, Y., Kolenic III, A., Fitzgerald, H.E., Harold, R., Eye, A.V.: Race, gender, and information technology use: the new digital divide. CyberPsychology Behav. 11(4), 437–442 (2008)
23.
go back to reference Kang, R., Dabbish, L., Fruchter, N., Kiesler, S.: My data just goes everywhere: user mental models of the internet and implications for privacy and security. In: SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security, pp. 39–52 (2016). ISBN 9781931971249 Kang, R., Dabbish, L., Fruchter, N., Kiesler, S.: My data just goes everywhere: user mental models of the internet and implications for privacy and security. In: SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security, pp. 39–52 (2016). ISBN 9781931971249
24.
go back to reference Keus, K., Gast, T.: Configuration management in security related software engineering processes. Bundesamtfür Sicherheit in der Informationstechnik Postfach 20, 03–63 (1996) Keus, K., Gast, T.: Configuration management in security related software engineering processes. Bundesamtfür Sicherheit in der Informationstechnik Postfach 20, 03–63 (1996)
25.
go back to reference Krombholz, K., Busse, K., Pfeffer, K., Smith, M., Zezschwitz, E.V.: If HTTPS were secure, I wouldn’t need 2FA - end user and administrator mental models of HTTPS. In: Proceedings - IEEE Symposium on Security and Privacy, pp. 246–263 (2019). ISSN 10816011. https://doi.org/10.1109/SP.2019.00060 Krombholz, K., Busse, K., Pfeffer, K., Smith, M., Zezschwitz, E.V.: If HTTPS were secure, I wouldn’t need 2FA - end user and administrator mental models of HTTPS. In: Proceedings - IEEE Symposium on Security and Privacy, pp. 246–263 (2019). ISSN 10816011. https://​doi.​org/​10.​1109/​SP.​2019.​00060
27.
go back to reference Leonard, T.C.: Richard H. Thaler, Cass R. Sunstein, nudge: improving decisions about health, wealth, and happiness. Const. Polit. Econ. 19, 356–360 (2008) Leonard, T.C.: Richard H. Thaler, Cass R. Sunstein, nudge: improving decisions about health, wealth, and happiness. Const. Polit. Econ. 19, 356–360 (2008)
29.
go back to reference Mai, A., Pfeffer, K., Gusenbauer, M., Weippl, E., Krombholz, K.: User mental models of cryptocurrency systems - a grounded theory approach. In: Proceedings of the 16th Symposium on Usable Privacy and Security, SOUPS 2020, pp. 341–358 (2020) Mai, A., Pfeffer, K., Gusenbauer, M., Weippl, E., Krombholz, K.: User mental models of cryptocurrency systems - a grounded theory approach. In: Proceedings of the 16th Symposium on Usable Privacy and Security, SOUPS 2020, pp. 341–358 (2020)
31.
go back to reference Norman, D.: The Design of Everyday Things: Revised and Expanded Edition. Basic Books, New York (2013) Norman, D.: The Design of Everyday Things: Revised and Expanded Edition. Basic Books, New York (2013)
33.
go back to reference Sasse, M., Flechais, I.: Usable security: why do we need it? how do we get it? (2005) Sasse, M., Flechais, I.: Usable security: why do we need it? how do we get it? (2005)
35.
go back to reference Sharma, K., Zhan, X., Nah, F.F.-H., Siau, K., Cheng, M.X.: Impact of digital nudging on information security behavior: an experimental study on framing and priming in cybersecurity. Organ. Cybersecur. J.: Pract. Process People (2021). ISSN 2635–0270. https://doi.org/10.1108/ocj-03-2021-0009 Sharma, K., Zhan, X., Nah, F.F.-H., Siau, K., Cheng, M.X.: Impact of digital nudging on information security behavior: an experimental study on framing and priming in cybersecurity. Organ. Cybersecur. J.: Pract. Process People (2021). ISSN 2635–0270. https://​doi.​org/​10.​1108/​ocj-03-2021-0009
37.
go back to reference Ur, B., Bees, J., Segreti, S.M., Bauer, L., Christin, N., Cranor, L.F.: Do users’ perceptions of password security match reality? In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 3748–3760 (2016) Ur, B., Bees, J., Segreti, S.M., Bauer, L., Christin, N., Cranor, L.F.: Do users’ perceptions of password security match reality? In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 3748–3760 (2016)
39.
go back to reference Wash, R., Rader, E.: Too much knowledge? Security beliefs and protective behaviors among United States internet users. In: SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security, pp. 309–325 (2019) Wash, R., Rader, E.: Too much knowledge? Security beliefs and protective behaviors among United States internet users. In: SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security, pp. 309–325 (2019)
40.
go back to reference Wash, R., Rader, E., Fennell, C.: Can people self-report security accurately? agreement between self-report and behavioral measures. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 2228–2232 (2017) Wash, R., Rader, E., Fennell, C.: Can people self-report security accurately? agreement between self-report and behavioral measures. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 2228–2232 (2017)
41.
go back to reference Whitten, A., Tygar, J.D.: Usability of security : a case study. Computer Science, no. 102590, pp. 1–41 (1998) Whitten, A., Tygar, J.D.: Usability of security : a case study. Computer Science, no. 102590, pp. 1–41 (1998)
Metadata
Title
Security Mental Models and Personal Security Practices of Internet Users in Africa
Authors
Enock Samuel Mbewe
Josiah Chavula
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-06374-9_4

Premium Partner