Will You Log into Tinder using your Facebook Account? Adoption of Single Sign-On for Privacy-Sensitive Apps

被引:3
作者
Cho, Eugene [1 ]
Kim, Jinyoung [1 ]
Sundar, S. Shyam [1 ]
机构
[1] Penn State Univ, Media Effects Res Lab, University Pk, PA 16802 USA
来源
CHI'20: EXTENDED ABSTRACTS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS | 2020年
基金
美国国家科学基金会;
关键词
OAuth; online dating; privacy; single sign-on (SSO); security; SECURITY;
D O I
10.1145/3334480.3383074
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
When signing up for new mobile apps, users are often provided the option of using their Facebook or other social media credentials (i.e., single sign-on services; SSO). While SSO is designed to make the login process more seamless and convenient, recent social media data breaches may give pause to users by raising security concerns about their online transactions. In particular, users logging into sensitive services, such as dating apps, may feel hesitant to adopt SSO due to perceived potential data leakage to their social networks. We tested this proposition through a user study (N = 364) and found that individual differences in online security perceptions predict the use of SSO for certain sensitive services (e.g., affair apps), but not others (e.g., matchmaking apps). Informed by theory, potential mediators of this relationship (perceived security, ease of sharing, and usability) were also explored, thus shedding light on psychologically salient drivers of SSO adoption.
引用
收藏
页数:7
相关论文
共 11 条
[1]  
[Anonymous], 2018, CNN
[2]   THE MODERATOR MEDIATOR VARIABLE DISTINCTION IN SOCIAL PSYCHOLOGICAL-RESEARCH - CONCEPTUAL, STRATEGIC, AND STATISTICAL CONSIDERATIONS [J].
BARON, RM ;
KENNY, DA .
JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY, 1986, 51 (06) :1173-1182
[3]   How Can We Tell When a Heuristic Has Been Used? Design and Analysis Strategies for Capturing the Operation of Heuristics [J].
Bellur, Saraswathi ;
Sundar, S. Shyam .
COMMUNICATION METHODS AND MEASURES, 2014, 8 (02) :116-137
[4]  
Burgess M., 2018, WIRED
[5]  
Egelman Serge, 2013, CHI '13 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, P2369, DOI 10.1145/2470654.2481328
[6]   An affair to remember: The role of sexual scripts in perceptions of sexual intent [J].
Lenton, AP ;
Bryan, A .
PERSONAL RELATIONSHIPS, 2005, 12 (04) :483-498
[7]  
Salas D, 2004, PSYCHOL REP, V94, P1322, DOI 10.2466/PR0.94.3.1322-1324
[8]   Perceived security and World Wide Web purchase intention [J].
Salisbury, WD ;
Pearson, RA ;
Pearson, AW ;
Miller, DW .
INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2001, 101 (3-4) :165-176
[9]  
Sun S.T., 2012, P 2012 ACM C COMP CO, P378, DOI [10.1145/2382196.2382238, DOI 10.1145/2382196.2382238]
[10]   Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services [J].
Wang, Rui ;
Chen, Shuo ;
Wang, XiaoFeng .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :365-379