usenix conference policies
You are here
Behavioral Experiments Exploring Victims’ Response to Cyber-based Financial Fraud and Identity Theft Scenario Simulations
Heather Rosoff, Jinshu Cui, and Richard John, University of Southern California
We conducted two scenario-simulation behavioral experiments to explore individual users’ response to common cyber-based financial fraud and identity theft attacks depend on systematically manipulated variables related to characteristics of the attack and the attacker. Experiment I employed a 4 by 2 between-groups factorial design, manipulating attacker characteristics (individual with picture vs. individual vs. group vs. unknown) and attack mode (acquiring a bank database vs. obtaining personal bank account information) in response to a bank letter scenario notifying respondents of a data breach. Respondents’ positive and negative affect, perceived risk, behavioral intention and attitude towards the government’s role in cyber security were measured. Results suggest that respondents experienced greater negative affect when the attacker was an individual, as well as experienced more positive affect when the attack target was an individual bank account. In addition, a picture of an individual attacker increased intended behavioral changes and expectations of the bank to manage the response in the bank database attacks only. Experiment II utilized a 4 by 3 between-groups factorial design, manipulating attacker motivation (fame vs. money vs. terrorism vs. unknown) and attack resolution status (resolved vs. still at risk vs. unknown) in response to an identity theft scenario that evolves over four time points. In this experiment, respondents’ affect, perceived risk and intended short- and long-term behavior were measured at each time point. Results suggest that respondents reported less perceived risk when the attacker’s motivation was to fund terrorism. Respondents also reported lower negative affect and lower perceived risk when the identity theft case was reported as resolved. Respondents also were more willing to pursue longterm behavior changes when the attack outcome was still at risk or unknown. In both experiments, respondents’ sex and age were related to affect, risk perception, and behavioral intentions. The paper also includes discussion of how further understanding of individual user decision making informs policy makers’ design and implementation of cyber security policies related to credit fraud and identity theft.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {Heather Rosoff and Jinshu Cui and Richard John},
title = {Behavioral Experiments Exploring {Victims{\textquoteright}} Response to Cyber-based Financial Fraud and Identity Theft Scenario Simulations},
booktitle = {10th Symposium On Usable Privacy and Security (SOUPS 2014)},
year = {2014},
isbn = {978-1-931971-13-3},
address = {Menlo Park, CA},
pages = {175--186},
url = {https://www.usenix.org/conference/soups2014/proceedings/presentation/rosoff},
publisher = {USENIX Association},
month = jul
}
connect with us