Can Social Influence Be Exploited To Compromise Security: An Online Experimental Evaluation

ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining Vancouver British Columbia Canada August, 2019(2019)

引用 0|浏览0
暂无评分
摘要
While social media enables users and organizations to obtain useful information about technology like software and security feature usage, it can also allow an adversary to exploit users by obtaining information from them or influencing them towards injurious decisions. Prior research indicates that security technology choices are subject to social influence and that these decisions are often influenced by the peer decisions and number of peers in a user's network. In this study we investigated whether peer influence dictates users' decisions by manipulating social signals from peers in an online, controlled experiment. Human participants recruited from Amazon Mechanical Turk played a multi-round game in which they selected a security technology from among six of differing utilities. We observe that at the end of the game, a strategy to expose users to high quantity of peer signals reflecting suboptimal choices, in the later stages of the game successfully influences users to deviate from the optimal security technology. This strategy influences almost 1.5 times the number of users with respect to the strategy where users receive constant low quantity of similar peer signals in all rounds of the game.
更多
查看译文
关键词
social influence,online experimental evaluation,social media,security technology choices,peer influence,social signals,optimal security technology,Amazon Mechanical Turk
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要