skip to main content
10.1145/2435349.2435362acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Comparative eye tracking of experts and novices in web single sign-on

Published: 18 February 2013 Publication History

Abstract

Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks.
In this work, we examine whether computer or security expertise affects use of web browser security indicators. Our study takes place in the context of web-based single sign-on, in which a user can use credentials from a single identity provider to login to many relying websites; single sign-on is a more complex, and hence more difficult, security task for users. In our study, we used eye trackers and surveyed participants to examine the cues individuals use and those they report using, respectively.
Our results show that users with security expertise are more likely to self-report looking at security indicators, and eye-tracking data shows they have longer gaze duration at security indicators than those without security expertise. However, computer expertise alone is not correlated with recorded use of security indicators. In survey questions, neither experts nor novices demonstrate a good understanding of the security consequences of web-based single sign-on.

References

[1]
The OAuth 1.0 protocol, April 2010. RFC 5849.
[2]
L. F. Cranor, editor. Proc. 7th Symposium on Usable Privacy and Security (SOUPS) 2011. ACM, 2011.
[3]
R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proc. SIGCHI Conference on Human Factors in Computing Systems (CHI) 2006, pages 581--590. ACM, 2006.
[4]
S. Egelman. Trust me: Design patterns for constructing trustworthy trust indicators. PhD thesis, Carnegie Mellon University, April 2009.
[5]
Electronic Frontier Foundation. The EFF SSL Observatory, 2010.
[6]
B. Friedman, D. Hurley, D. C. Howe, E. W. Felten, and H. Nissenbaum. Users' conceptions of web security: a comparative study. In Proc. CHI '02 Extended Abstracts on Human Factors in Computing Systems, pages 746--747. ACM, 2002.
[7]
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Communications of the ACM, 50(10):94--100, October 2007.
[8]
J. Kruschke. Doing Bayesian Data Analysis: A Tutorial with R and BUGS. Academic Press, 1st edition, 2010.
[9]
M. Olson. Janrain social login and social sharing trends across the web for Q3 2012, October 2012.
[10]
OpenID Foundation. Specifications, 2010.
[11]
A. Patrick. Commentary on research on new security indicators, March 2007.
[12]
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In Proc. IEEE Symposium on Security and Privacy (S&P) 2007, pages 51--65. IEEE Press, 2007.
[13]
A. Smith and G. Roberts. Bayesian computation via the Gibbs sampler and related Markov Chain Monte Carlo methods. J. Royal Statistical Society. Series B (Methodological), 55(1):3--23, 1993.
[14]
J. Sobey, R. Biddle, P. van Oorschot, and A. S. Patrick. Exploring user reactions to new browser cues for extended validation certificates. In S. Jajodia and J. Lopez, editors, Proc. 13th European Symposium on Research in Computer Security (ESORICS) 2008, volume 5283 of LNCS, pages 411--427. Springer, 2008.
[15]
A. Sotirakopoulos, K. Hawkey, and K. Beznosov. "I did it because I trusted you": Challenges with the study environment biasing participant behaviours. In SOUPS Usable Security Experiment Reports (USER) Workshop, 2010.
[16]
A. Sotirakopoulos, K. Hawkey, and K. Beznosov. On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings. In Cranor {2}.
[17]
D. Stebila. Reinforcing bad behaviour: the misuse of security indicators on popular websites. In Proc. 22nd Australasian Conf. on Computer-Human Interaction (OzCHI) 2010, pages 248--251. ACM, 2010.
[18]
S.-T. Sun, E. Pospisil, I. Muslukhov, N. Dindar, K. Hawkey, and K. Beznosov. What makes users refuse web single sign-on?: an empirical investigation of OpenID. In Cranor {2}, pages 4:1--4:20.
[19]
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying wolf: An empirical study of SSL warning effectiveness. In Proc. 18th USENIX Security Symposium, 2009.
[20]
T. Whalen and K. M. Inkpen. Gathering evidence: use of visual security cues in web browsers. In K. M. Inkpen and M. van de Panne, editors, Proc. Graphics Interface 2005, volume 112 of Graphics Interface, pages 137--144. Canadian Human-Computer Communications Society, 2005.
[21]
R. T. Wright and K. Marett. The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived. J. Management Info. Sys., 27(1):273--303, July 2010.

Cited By

View all

Index Terms

  1. Comparative eye tracking of experts and novices in web single sign-on

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacy
    February 2013
    400 pages
    ISBN:9781450318907
    DOI:10.1145/2435349
    • General Chairs:
    • Elisa Bertino,
    • Ravi Sandhu,
    • Program Chair:
    • Lujo Bauer,
    • Publications Chair:
    • Jaehong Park
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 February 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. experts
    2. eye-tracking
    3. https
    4. security indicators
    5. single sign-on
    6. usability
    7. web browsers

    Qualifiers

    • Research-article

    Conference

    CODASPY'13
    Sponsor:

    Acceptance Rates

    CODASPY '13 Paper Acceptance Rate 24 of 107 submissions, 22%;
    Overall Acceptance Rate 149 of 789 submissions, 19%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 02 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media