45 research outputs found
Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption
Behavior change ideas from health psychology can also help boost end user
compliance with security recommendations, such as adopting two-factor
authentication (2FA). Our research adapts the Transtheoretical Model Stages of
Change from health and wellness research to a cybersecurity context. We first
create and validate an assessment to identify workers on Amazon Mechanical Turk
who have not enabled 2FA for their accounts as being in Stage 1 (no intention
to adopt 2FA) or Stages 2-3 (some intention to adopt 2FA). We randomly assigned
participants to receive an informational intervention with varied content
(highlighting process, norms, or both) or not. After three days, we again
surveyed workers for Stage of Amazon 2FA adoption. We found that those in the
intervention group showed more progress toward action/maintenance (Stages 4-5)
than those in the control group, and those who received content highlighting
the process of enabling 2FA were significantly more likely to progress toward
2FA adoption. Our work contributes support for applying a Stages of Change
Model in usable security.Comment: 41 pages, including the stage algorithm programmed on Mturk, the
survey flow and specific items used, and a link to download the five
informational handouts used for the control condition and the 2FA
intervention condition
Nip it in the Bud: Moderation Strategies in Open Source Software Projects and the Role of Bots
Much of our modern digital infrastructure relies critically upon open sourced
software. The communities responsible for building this cyberinfrastructure
require maintenance and moderation, which is often supported by volunteer
efforts. Moderation, as a non-technical form of labor, is a necessary but often
overlooked task that maintainers undertake to sustain the community around an
OSS project. This study examines the various structures and norms that support
community moderation, describes the strategies moderators use to mitigate
conflicts, and assesses how bots can play a role in assisting these processes.
We interviewed 14 practitioners to uncover existing moderation practices and
ways that automation can provide assistance. Our main contributions include a
characterization of moderated content in OSS projects, moderation techniques,
as well as perceptions of and recommendations for improving the automation of
moderation tasks. We hope that these findings will inform the implementation of
more effective moderation practices in open source communities
Social Media in Transparent Work Environments
Abstract-Social media is being integrated into work environments making them more transparent. When the work environment is transparent, it has the potential to allow projects to transmit information about work artifacts and events quickly through a large network. Using signaling theory, we propose a theory that users interpret this information and then make workrelated decisions about attention and effort allocation in a principled manner. In our research setting, an open source context of voluntary participation, broadcast activity information act as signals that allow developers to make highly informed choices about where to expend their attention and effort and with whom to collaborate. We propose four potential signals from literature and interviews with developers in our research setting and discuss the implications for social media in software development environments
Beyond Textual Issues: Understanding the Usage and Impact of GitHub Reactions
Recently, GitHub introduced a new social feature, named reactions, which are
"pictorial characters" similar to emoji symbols widely used nowadays in
text-based communications. Particularly, GitHub users can use a pre-defined set
of such symbols to react to issues and pull requests. However, little is known
about the real usage and impact of GitHub reactions. In this paper, we analyze
the reactions provided by developers to more than 2.5 million issues and 9.7
million issue comments, in order to answer an extensive list of nine research
questions about the usage and adoption of reactions. We show that reactions are
being increasingly used by open source developers. Moreover, we also found that
issues with reactions usually take more time to be handled and have longer
discussions.Comment: 10 page
Self-Control in Cyberspace: Applying Dual Systems Theory to a Review of Digital Self-Control Tools
Many people struggle to control their use of digital devices. However, our
understanding of the design mechanisms that support user self-control remains
limited. In this paper, we make two contributions to HCI research in this
space: first, we analyse 367 apps and browser extensions from the Google Play,
Chrome Web, and Apple App stores to identify common core design features and
intervention strategies afforded by current tools for digital self-control.
Second, we adapt and apply an integrative dual systems model of self-regulation
as a framework for organising and evaluating the design features found. Our
analysis aims to help the design of better tools in two ways: (i) by
identifying how, through a well-established model of self-regulation, current
tools overlap and differ in how they support self-control; and (ii) by using
the model to reveal underexplored cognitive mechanisms that could aid the
design of new tools.Comment: 11.5 pages (excl. references), 6 figures, 1 tabl
ScreenTrack: Using a Visual History of a Computer Screen to Retrieve Documents and Web Pages
Computers are used for various purposes, so frequent context switching is
inevitable. In this setting, retrieving the documents, files, and web pages
that have been used for a task can be a challenge. While modern applications
provide a history of recent documents for users to resume work, this is not
sufficient to retrieve all the digital resources relevant to a given primary
document. The histories currently available do not take into account the
complex dependencies among resources across applications. To address this
problem, we tested the idea of using a visual history of a computer screen to
retrieve digital resources within a few days of their use through the
development of ScreenTrack. ScreenTrack is software that captures screenshots
of a computer at regular intervals. It then generates a time-lapse video from
the captured screenshots and lets users retrieve a recently opened document or
web page from a screenshot after recognizing the resource by its appearance. A
controlled user study found that participants were able to retrieve requested
information more quickly with ScreenTrack than under the baseline condition
with existing tools. A follow-up study showed that the participants used
ScreenTrack to retrieve previously used resources and to recover the context
for task resumption.Comment: CHI 2020, 10 pages, 7 figure