Skip to main content

2019 | OriginalPaper | Buchkapitel

Understanding Perceptions: User Responses to Browser Warning Messages

verfasst von : Heather Molyneaux, Irina Kondratova, Elizabeth Stobert

Erschienen in: HCI for Cybersecurity, Privacy and Trust

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With changes in interfaces resulting from the proliferation of IOT devices and new technologies such as self-driving vehicles, user reactions to browser messages may also change. This paper reviews the literature on user reactions to browser warnings, with emphasis on screen size and form factors. The literature indicates that browser warning message design, habituation, awareness of risk and screen size are aspects that effect user perception of risk. This article surveys the findings while noting challenges and proposed solutions to support effective provision of and user compliance with browser security warnings as well as important user study design considerations for future work – in particular, future work on the effect of screen size on user perception of browser warnings.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mell, P., Kent, K., Nusbaum, J.: Guide to malware incident prevention and handling. US Department of Commerce, Technology Administration, National Institute of Standards and Technology 800-83. Gaithersburg, Maryland (2005) Mell, P., Kent, K., Nusbaum, J.: Guide to malware incident prevention and handling. US Department of Commerce, Technology Administration, National Institute of Standards and Technology 800-83. Gaithersburg, Maryland (2005)
2.
Zurück zum Zitat Souppaya, M., Scarfone, K.: Guide to malware incident prevention and handling for desktops and laptops. NIST Special Publication 800-83 (2013) Souppaya, M., Scarfone, K.: Guide to malware incident prevention and handling for desktops and laptops. NIST Special Publication 800-83 (2013)
4.
Zurück zum Zitat Borger, W., Iacono, L.L.: User perception and response to computer security warnings. In: Weisbecker, A., Burmester, M., Schmidt, A. (eds) Mensch und computer 2015 Workshopband Stuttgart: Oldenbourg Wissenschaftsverlag, pp. 621–646 (2015) Borger, W., Iacono, L.L.: User perception and response to computer security warnings. In: Weisbecker, A., Burmester, M., Schmidt, A. (eds) Mensch und computer 2015 Workshopband Stuttgart: Oldenbourg Wissenschaftsverlag, pp. 621–646 (2015)
5.
Zurück zum Zitat Jorgensen, Z., Chen, J., Gates, C.S., Li, N., Proctor, R.W., Yu, T.: Dimensions of risk in mobile applications: a user study. In: CODASPY 2015, San Antonio, Texas, pp. 49–60, 2–4 March 2015 Jorgensen, Z., Chen, J., Gates, C.S., Li, N., Proctor, R.W., Yu, T.: Dimensions of risk in mobile applications: a user study. In: CODASPY 2015, San Antonio, Texas, pp. 49–60, 2–4 March 2015
6.
Zurück zum Zitat Virilis, N., Mylonas, A., Nikolaos, T.: Security busters: web browser security vs. rogue sites. Comput. Secur. 52, 90–105 (2015) Virilis, N., Mylonas, A., Nikolaos, T.: Security busters: web browser security vs. rogue sites. Comput. Secur. 52, 90–105 (2015)
7.
Zurück zum Zitat Fagan, M., Khan, M., Buck, R.: A Study of user’s experiences and beliefs about software update messages. Comput. Hum. Behav. 51, 504–519 (2015)CrossRef Fagan, M., Khan, M., Buck, R.: A Study of user’s experiences and beliefs about software update messages. Comput. Hum. Behav. 51, 504–519 (2015)CrossRef
8.
Zurück zum Zitat Balebako, R., Schaub, F., Adjerid, I., Acquisti, A., Cranor, L.F.: The impact of timing on the Salience of smartphone app privacy notices. In: SPSM 2015, Denver, Colorado, pp. 63–74, 12 October 2015 Balebako, R., Schaub, F., Adjerid, I., Acquisti, A., Cranor, L.F.: The impact of timing on the Salience of smartphone app privacy notices. In: SPSM 2015, Denver, Colorado, pp. 63–74, 12 October 2015
9.
Zurück zum Zitat Carpenter, S., Zhu, F., Kolimi, S.: Reducing online identity disclosure using warnings. Appl. Ergon. 45(5), 1337–1342 (2014)CrossRef Carpenter, S., Zhu, F., Kolimi, S.: Reducing online identity disclosure using warnings. Appl. Ergon. 45(5), 1337–1342 (2014)CrossRef
10.
Zurück zum Zitat Herzberg, A, Jbara, A: Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Technol. 8(4), 16 (2008)CrossRef Herzberg, A, Jbara, A: Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Technol. 8(4), 16 (2008)CrossRef
11.
Zurück zum Zitat Dong, X., Clark, J., Jacob, J.: Defending the weakest link: phishing websites section by analysing user behaviours. Telecommun. Syst. 45(2–3), 215–226 (2010)CrossRef Dong, X., Clark, J., Jacob, J.: Defending the weakest link: phishing websites section by analysing user behaviours. Telecommun. Syst. 45(2–3), 215–226 (2010)CrossRef
12.
Zurück zum Zitat Junger, M., Montoya, L., Overink, F.-J.: Priming and warnings are not effective to prevent social engineering attacks. Comput. Hum. Behav. 66, 75–87 (2017)CrossRef Junger, M., Montoya, L., Overink, F.-J.: Priming and warnings are not effective to prevent social engineering attacks. Comput. Hum. Behav. 66, 75–87 (2017)CrossRef
13.
Zurück zum Zitat Silic, M., Back, A.: The dark side of social networking sites: understanding phishing risks. Comput. Hum. Behav. 60, 35–43 (2016)CrossRef Silic, M., Back, A.: The dark side of social networking sites: understanding phishing risks. Comput. Hum. Behav. 60, 35–43 (2016)CrossRef
14.
Zurück zum Zitat Böhme, R., Köpsell, S.: Trained to accept? a field experiment on consent dialogs. In: CHI 2010, Atlanta Georgia, pp. 2403–2406, 10–15 April 2010 Böhme, R., Köpsell, S.: Trained to accept? a field experiment on consent dialogs. In: CHI 2010, Atlanta Georgia, pp. 2403–2406, 10–15 April 2010
15.
Zurück zum Zitat Reeder, R., Felt, A., Consolvo, S., Malkin, N., Thompson, C., Egelman, S.: An experience sampling study of user reactions to browser warnings in the field. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM (2018) Reeder, R., Felt, A., Consolvo, S., Malkin, N., Thompson, C., Egelman, S.: An experience sampling study of user reactions to browser warnings in the field. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM (2018)
16.
Zurück zum Zitat Alsharnouby, M., Alaca, F, Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum.-Comput. Stud. 82(10), 69–82 (2015)CrossRef Alsharnouby, M., Alaca, F, Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum.-Comput. Stud. 82(10), 69–82 (2015)CrossRef
17.
Zurück zum Zitat Iuga, C., Nurse, J., Erola, A.: Baiting the hook: factors impacting susceptibility to phishing attacks. Hum.-centric Comput. Inf. Sci. 6(1), 8 (2016) Iuga, C., Nurse, J., Erola, A.: Baiting the hook: factors impacting susceptibility to phishing attacks. Hum.-centric Comput. Inf. Sci. 6(1), 8 (2016)
18.
Zurück zum Zitat Purkait, S., Kumar De., S, Suar, D.: An Empirical investigation of the factors that influence internet user’s ability to correctly identify a phishing website. Inf. Manage. Comput. Secur. 22(3), 194–234 (2014)CrossRef Purkait, S., Kumar De., S, Suar, D.: An Empirical investigation of the factors that influence internet user’s ability to correctly identify a phishing website. Inf. Manage. Comput. Secur. 22(3), 194–234 (2014)CrossRef
19.
Zurück zum Zitat Mamonov, S., Renbunan-Fich, R.: The impact of information security threat awareness on privacy-protective behaviors. Comput. Hum. Behav. 83, 32–44 (2018)CrossRef Mamonov, S., Renbunan-Fich, R.: The impact of information security threat awareness on privacy-protective behaviors. Comput. Hum. Behav. 83, 32–44 (2018)CrossRef
20.
Zurück zum Zitat Marforio, C., Masti, R.J., Soriente, C., Kostianinen, K., Capkun, S.: Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications. In: CHI 2016 #chiforgood, San Jose, CA, USA, pp. 540–551 (2016) Marforio, C., Masti, R.J., Soriente, C., Kostianinen, K., Capkun, S.: Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications. In: CHI 2016 #chiforgood, San Jose, CA, USA, pp. 540–551 (2016)
21.
Zurück zum Zitat Schechter, S., Dhamija, R., Ozment, A., Fischer, I.: The emperor’s new security indicators: an evaluation of website authentication and the effect of role playing on usability studies. In: IEEE Symposium on Security (2007) Schechter, S., Dhamija, R., Ozment, A., Fischer, I.: The emperor’s new security indicators: an evaluation of website authentication and the effect of role playing on usability studies. In: IEEE Symposium on Security (2007)
22.
Zurück zum Zitat Kelley, T., Bertenthal, B.I.: Attention and past behavior, not security knowledge, modulate users’ decisions to login to insecure websites. Inf. Comput. Secur. 24(2), 164–176 (2016)CrossRef Kelley, T., Bertenthal, B.I.: Attention and past behavior, not security knowledge, modulate users’ decisions to login to insecure websites. Inf. Comput. Secur. 24(2), 164–176 (2016)CrossRef
23.
Zurück zum Zitat Fagan, M., Khan, M.M.H., Nguyen, N.: How does this message make you feel? a study of user perspectives on software update/warning message design. Hum.-centric Comput. Inf. Sci. 5(1), 36 (2015)CrossRef Fagan, M., Khan, M.M.H., Nguyen, N.: How does this message make you feel? a study of user perspectives on software update/warning message design. Hum.-centric Comput. Inf. Sci. 5(1), 36 (2015)CrossRef
24.
Zurück zum Zitat Modic, D., Anderson, R.: Reading this may harm your computer: the psychology of malware warnings. Comput. Hum. Behav. 41, 71–79 (2014)CrossRef Modic, D., Anderson, R.: Reading this may harm your computer: the psychology of malware warnings. Comput. Hum. Behav. 41, 71–79 (2014)CrossRef
25.
Zurück zum Zitat Anderson, B.B., Jenkins, J.L., Vance, A., Kirwan, C.B., Eargle, D.: Your memory is working against you: how eye tracking and memory explain habituation to security warnings. Decis. Support Syst. 92, 3–13 (2016)CrossRef Anderson, B.B., Jenkins, J.L., Vance, A., Kirwan, C.B., Eargle, D.: Your memory is working against you: how eye tracking and memory explain habituation to security warnings. Decis. Support Syst. 92, 3–13 (2016)CrossRef
26.
Zurück zum Zitat Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L.: Taxonomy of mobile users’ security awareness. Comput. Secur. 73, 266–293 (2018)CrossRef Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L.: Taxonomy of mobile users’ security awareness. Comput. Secur. 73, 266–293 (2018)CrossRef
27.
Zurück zum Zitat Goel, D., Jain, A.K.: Mobile phishing attacks and defense mechanisms: state of art and open research challenges. Comput. Secur. 73, 519–544 (2018)CrossRef Goel, D., Jain, A.K.: Mobile phishing attacks and defense mechanisms: state of art and open research challenges. Comput. Secur. 73, 519–544 (2018)CrossRef
28.
Zurück zum Zitat Shah, R., Patil, K.: Evaluating effectiveness of mobile browser security warnings. ICTACT J. Commun. Technol. 7(3), 1373–1378 (2016) Shah, R., Patil, K.: Evaluating effectiveness of mobile browser security warnings. ICTACT J. Commun. Technol. 7(3), 1373–1378 (2016)
29.
Zurück zum Zitat Virvilis, N., Tsalis, N., Mylonas, A., Gritzalis, D.: Mobile devices: a phisher’s paradise. In: 2014 11th International Conference on Security and Cryptography (SECRYPT), pp. 1–9. IEEE, August 2014 Virvilis, N., Tsalis, N., Mylonas, A., Gritzalis, D.: Mobile devices: a phisher’s paradise. In: 2014 11th International Conference on Security and Cryptography (SECRYPT), pp. 1–9. IEEE, August 2014
30.
Zurück zum Zitat Raptis, D., Tselios, N., Kjeldskov, J., Skov, M.: Does size matter? investigating the impact of mobile phone screen size on users’ oerceieved usability, effectiveness and efficiency. In: Mobile HCI, pp. 127–136. ACM (2013) Raptis, D., Tselios, N., Kjeldskov, J., Skov, M.: Does size matter? investigating the impact of mobile phone screen size on users’ oerceieved usability, effectiveness and efficiency. In: Mobile HCI, pp. 127–136. ACM (2013)
31.
Zurück zum Zitat Chin, E., Felt, A.P, Sekar, V., Wagner, D.: Measuring user confidence in smartphone security and privacy. In: Symposium on Usable Privacy and Security (SOUPS), Washington DC, pp. 1–16, 11–13 July 2012 Chin, E., Felt, A.P, Sekar, V., Wagner, D.: Measuring user confidence in smartphone security and privacy. In: Symposium on Usable Privacy and Security (SOUPS), Washington DC, pp. 1–16, 11–13 July 2012
32.
Zurück zum Zitat Redmiles, E.M., Zhu, Z., Kross, S., Kuchhal, D., Dumitras, T., Mazurek, M.L.: Asking for a friend: evaluating response biases in security user studies. In: CCS2018. Toronto ON, 15–19 October 2018 Redmiles, E.M., Zhu, Z., Kross, S., Kuchhal, D., Dumitras, T., Mazurek, M.L.: Asking for a friend: evaluating response biases in security user studies. In: CCS2018. Toronto ON, 15–19 October 2018
Metadaten
Titel
Understanding Perceptions: User Responses to Browser Warning Messages
verfasst von
Heather Molyneaux
Irina Kondratova
Elizabeth Stobert
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-22351-9_11