Harnessing the Challenges and Solutions to Improve Security Warnings: A Review
Abstract
:1. Introduction
2. Security Warnings Background
3. Problems and Challenges of Security Warnings
3.1. Lack of Understanding towards Technical Wordings
3.2. Inattention towards Warnings
3.3. Lack of Understanding towards Warning
3.4. Poor Mental Model
3.5. Unmotivated towards Heeding Warnings
3.6. Low Assessment of the Implication of Warnings
3.7. Low Evaluation of Risk from Warnings
3.8. Immersion in the Primary Task
3.9. Habituation to Security Warning
3.10. Summary of Problems and Challenges
4. Approaches to Improve Security Warnings
4.1. Polymorphic
4.2. Audited Dialog
4.3. Iterative Design
4.4. Mental Model
4.5. Attractors and Thermal Feedback
4.6. Adaptive Security Dialogues
4.7. Facial Cues
4.8. Alternative Security Dialogues-Kawaii
- i.
- Incorporating “Kawaii” effect;
- ii.
- Utilising animation and audible stimulus in the security warning dialog.
4.9. Console Security Feedback or Advice
5. Proposed Timelines of Problems, Challenges, and Approaches to Improving Security Warnings
6. Discussion
- i.
- Problems and challenges in security warnings;
- ii.
- Approaches to improving security warnings.
6.1. Problems, Challenges, and Approaches to Improving Security Warnings
6.2. Future Trends
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
Problems and Challenges | Authors of Related Studies |
---|---|
Lack of understanding towards technical jargon | Biddle et al. (2009), Raja et al. (2011), Harbach et al. (2013), Zaaba and Teo (2015), Whitten and Tygar (1999), Whalen and Inkpen (2005), Wu et al. (2006). |
Inattention towards warning | Seifert et al. (2006), Schechter et al. (2007), Karsher et al. (2006), Sobey et al. (2008), Anderson et al. (2016). |
Lack of comprehension towards warning | Friedman et al. (2002), Dourish et al. (2004), Sharek et al. (2008), Downs et al. (2006), Furnell et al. (2006), Egelmen et al. (2008), Sunshine et al. (2009), Devinna (2018), Vance et al. 2019, Molyneaux et al. (2020). |
Low evaluation of risk from warnings | Raja et al. (2011), Downs et al. (2006), Kauer et al. (2012), Egelmen and Schechter (2013), Althobaiti and Mayhew (2016). |
Poor mental model | Asgharpour et al. (2007), Wu et al. (2006), Egelmen et al. (2008), Camp (2009), Wash (2010), Bravo-Lillo et al. (2010). |
Unmotivated heeding warnings | Whalen and Inkpen (2005), West (2008), Herley (2009), Shi et al. (2011), Mesbah (2015) |
Low assessment of the implication of warnings | Zurko et al. (2002), Raja et al. (2011), Harbach et al. (2013), Reeder et al. (2018). |
Habituation to the security warning | Amer and Maris (2007), Villamarin-Salomon (2007), Akhawe and Felt (2013), Bravo-Lillo et al. (2013), Anderson et al. (2014), Kirwan et al. (2020). |
Immersion in the primary task | Sasse et al. (2001), Wu et al. (2006), Sharek et al. (2008). |
Authors | Descriptions |
---|---|
Polymorphic | |
Brustoloni and Villamarín-Salomón (2007) | They designed polymorphic dialogues using context-sensitive guidance (CSG) to help users in making a security decision. |
Anderson et al. (2015) | They designed new security warnings using a polymorphic warning to combat habituation. |
Amran (2017) | He proposed security warnings using polymorphic warning changes utilising the five variations to reduce the habituation effect. |
Vance et al. (2017) | They implemented four design variations in the experiment utilising pictorial symbols, background colour, jiggle and zoom animations, and zoom. |
Audited Dialogues | |
Brustoloni and Villamarin-Salomon (2007) | They proposed audited dialogues to improve the decision-making process among users. |
Interactive Design | |
Raja et al. (2011) | They designed the warnings using physical security metaphors such as locks, keys, doors, and walls to improve security warnings. |
Zhang-Kennedy et al. (2016) | They introduce the systematic five phases of an iterative model (ADDIE) that stands for analyse, design, develop, implement and evaluate. |
Webber et al. (2015) | They implemented the iterative design using participatory design (PD) method. This method is often used as an iterative process aiming at enhancing the product over a specific amount of time and multiple steps. |
Mental Model | |
Wash (2011) | He identified eight different mental models that guided home computer users in making security decisions. |
Blythe and Camp (2012) | They used mental model simulation to decide whether to back up files, checked against the ‘vandal’ model of hackers (above) and the ‘burglar’ model. |
Bravo-Lillo et al. (2011) | They introduced the mental model differences between advanced and novice users’ perceptions towards security warnings. |
Attractors & Thermal Feedback | |
Bravo-Lillo et al. (2013) | They proposed the use of attractors to attract users’ attention to an information field (salient field). |
Wilson et al. (2017) | They improved security warnings using thermal feedback where it significantly inherited links to emotion and danger. |
Adaptive Security Dialogues (ASD) | |
Keukelaere et al. (2009) | They utilised the ASD to catch the user’s attention when opening a potentially dangerous email attachment. In ASD, various level of user risk is addressed and correspondingly adapted to their dialogue’s implementation. |
Facial Cues | |
Eargle et al. (2016) | They integrated the facial cues of threat into security warnings to attract end users’ attention. In this approach, validated images of facial expressions including fear and disgust were integrated into the security warning design, which are efficient cues of danger in the immediate environment. |
Alternative Security Dialogues-Kawai | |
Minakawa and Takada (2017) | The proposed alternative security warning dialogues integrated with “Kawaii” effects utilising the animations and audio. |
Console Security Feedback or Advice | |
Gorski et al. (2018) | They proposed the API integrated security advice warning to significantly fixed participants’ insecure code. |
Gorski et al. (2020) | They utilized the security feedback where it should be transcended tools and flexible enough by the software developers over different development tools. |
Guidelines | Descriptions | Usage |
---|---|---|
NEAT | It is a guideline developed by Microsoft researchers for designing security warnings, i.e., necessary, explained, actionable, and tested. | It is mainly used as a guideline for designing security warnings (Garfinkel and Lipford, 2014). |
S.P.R.U.C.E | An extension of the ‘E’, explained, in NEAT Guidelines. After making sure the warning is necessary, precise, and adequate, an explanation must be provided to educate the user of the action or steps to be taken. | It is mainly used as a guideline for designing security warnings (Garfinkel and Lipford, 2014). |
HCI-S | It contains 6 criteria extracted from human computer interaction (HCI) and adapted in the security context. | It is used for improving the usability of systems by implementing interface changes (Johnston, 2003). |
Secure Interaction Design | It contains 10 design principles of what makes a system secure and usable at the same time. | It is used for evaluating a system for usable security criteria and how these criteria can be implemented by developers. |
Guidelines for Designing Usable Security Mechanisms | It is a guideline for software developers when designing security mechanisms. | It is used as a recommendation for users when designing security mechanisms so that they are usable. |
References
- Internet Users 2020. Available online: http://www.internetlivestats.com/internet-users/#sources (accessed on 26 June 2020).
- Alzahrani, F.A. Estimating security risk of healthcare web applications: A design perspective. Comput. Mater. Contin. 2021, 67, 187–209. [Google Scholar] [CrossRef]
- Goud, N. List of Countries Which Are Most Vulnerable to Cyber Attacks. Available online: https://www.cybersecurity-insiders.com/list-of-countries-which-are-most-vulnerable-to-cyber-attacks (accessed on 28 June 2020).
- Kaspersky. Kaspersky Security Bulletin 19 Statistics. Available online: https://go.kaspersky.com/rs/802-IJN-240/images/KSB_2019_Statistics_EN.pdf (accessed on 25 October 2021).
- Zaaba, Z.F. Enhancing Usability Using Automated Security Interface Adaption (ASIA). Ph.D. Thesis, University of Plymouth, Plymouth, UK, 2014. [Google Scholar]
- Bravo-Lillo, C.A. Improving Computer Security Dialogs: An Exploration of Attention and Habituation. Ph.D. Thesis, Carnegie Mellon University, Pittsburgh, PA, USA, 2014. [Google Scholar]
- Microsoft, Warning Messages. 2015. Available online: https://docs.microsoft.com/en-us/windows/win32/uxguide/mess-warn?redirectedfrom=MSDN (accessed on 28 June 2020).
- Microsoft. Standard Icons. 2018. Available online: https://docs.microsoft.com/en-us/windows/win32/uxguide/vis-std-icons (accessed on 3 July 2020).
- Ahmad, F.N.A.; Zaaba, Z.F.; Aminuddin, M.A.I.M.; Abdullah, N.L. Empirical Investigations on Usability of Security Warning Dialogs: End Users Experience. In International Conference on Advances Cyber Security, ACeS 2019: Advances in Cyber Security; Springer: Singapore, 2019; pp. 335–349. [Google Scholar]
- Bravo-Lillo, C.; Cranor, L.F.; Downs, J.S.; Komanduri, S. Bridging the Gap in Computer Security Warnings: A Mental Model Approach. Secur. Priv. IEEE 2011, 9, 18–26. [Google Scholar] [CrossRef]
- Fagan, M.; Khan, M.M.H. Why Do they Do What They do? A study of what motivates Users to (Not) Follow Computer Security Advice. In Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS), Denver, CO, USA, 22–24 June 2016; ISBN 978-1-931971-31-7. [Google Scholar]
- Harder, A.; Bansal, H.S.; Knowles, R.; Eldrige, J.; Murray, M.; Sehmer, L.; Turner, D. Shorter, Interviews, Longer Survey: Optimizing the survey participant experience whilst accommodating ever expanding client demands. In Proceedings of the ASC’s 7th International Conference: Are We There Yet? Where Technological Innovation is Leading Research, Winchester, UK, 8 September 2016. [Google Scholar]
- Hui, L.S.; Wen, A.C.; Teng, O.C.; Zaaba, Z.F.; Hussain, A. Investigations and Assessments on Web Browser Security. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 2019, 8, 392–397. [Google Scholar]
- Raja, F.; Hawkey, K.; Hsu, S.; Wang, K.L.C.; Beznosov, K. A Brick Wall, A Lock Door and A Bandit: A Physical Metaphor for Firewall Warnings. In Proceedings of the Seventh Symposium on Usable Privacy and Security, Pittsburg, PA, USA, 20–22 July 2011; pp. 1–20. [Google Scholar]
- Rao, A.; Schaub, F.; Sadeh, N.; Acquisti, A.; University, M.C.; Facebook, R.K. Expecting the Unexpected: Understanding Mismatched Privacy Expectation Online. In Proceedings of the Twelve Symposium on Usable Privacy and Security (SOUPS 2016), Denver, CO, USA, 22–24 June 2016; ISBN 978-931971-31-7. [Google Scholar]
- Samsudin, N.F. Improving Security Warnings: Iterative Design and Mental Model. Undergraduate Degree Thesis, Universiti Sains Malaysia, School of Computer Science, Sains, Malaysia, 2016. [Google Scholar]
- Samsudin, N.F.; Zaaba, Z.F. Further Investigation on Security Warning Implementation: A Case in Higher Institution. Adv. Sci. Lett. 2017, 23, 4141–4145. [Google Scholar] [CrossRef]
- Bravo-Lillo, C.; Cranor, L.; Downs, J.; Komanduri, S.; Sleeper, M. Improving Computer Security Dialogs. In Proceedings of the 13th International Conference on Human-Computer Interaction (INTERACT), Lisbon, Portugal, 5–9 September 2011. [Google Scholar]
- Molyneaux, H.; Stobert, E.; Kondratova, I.; Gaudet, M. Security Matters … Until Something Else Matters More: Security Notifications on Different Form Factors. In HCI for Cybersecurity, Privacy and Trust. HCII 2020. Lecture Notes in Computer Science; Moallem, A., Ed.; Springer: Berlin, Germany, 2020; Volume 12210, pp. 189–205. [Google Scholar]
- Amran, A.; Zaaba, Z.F.; Mahinderjit Singh, M.M. Habituation effects in computer security warning. Inf. Secur. J. A Glob. Perspect. 2018, 27, 119–131. [Google Scholar] [CrossRef]
- Microsoft. Messages. 2018. Available online: https://docs.microsoft.com/en-us/windows/win32/uxguide/messages (accessed on 3 July 2020).
- Samsudin, N.F.; Zaaba, Z.F. Security Warning Life Cycle: Challenges and Panacea. In Proceedings of the Advanced Research in Electronic and Information Technology International Conference (AVAREIT), Bali, Indonesia, 23–25 August 2016. [Google Scholar]
- Yi, C.L.X.; Zaaba, Z.F.; Aminuddin, M.A.I.M. Appraisal on User’s Comprehension in Security Warning Dialogs: Browsers Usability Perspective. In Proceedings of the International Conference on Advances Cyber Security, ACeS 2019: Advances in Cyber Security, Penang, Malaysia, 8–9 December 2020; pp. 320–334. [Google Scholar]
- Zaaba, Z.F.; Teo, K.B. Examination on Usability Issues of Security Warning Dialogs. J. Multidiscip. Eng. Sci. Technol. 2015, 2, 1337–1345. [Google Scholar]
- Zaaba, Z.F.; Furnell, S.M.; Dowland, P.S. Literature Studies on Security Warning Developments. Int. J. Perceptive Cogn. Comput. (IIUM) 2016, 2, 8–18. [Google Scholar] [CrossRef]
- Zaaba, Z.F.; Furnell, S.M.; Dowland, P.S. A Study on Improving Security Warnings. In Proceedings of the 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), Kuching, Sarawak, Malaysia, 17–18 November 2014. [Google Scholar]
- Vance, A.; Jenkins, J.L.; Anderson, B.B.; Brock Kirwan, C.; Bjornn, D. Improving Security Behavior Through Better Security Message Comprehension: fMRI and Eye-Tracking Insights. In Information Systems and Neuroscience. Lecture Notes in Information Systems and Organisation; Davis, F., Riedl, R., vom Brocke, J., Léger, P.M., Randolph, A., Eds.; Springer: Berlin, Germany, 2019; Volume 29, pp. 11–17. [Google Scholar]
- Kirwan, B.; Anderson, B.; Eargle, D.; Jenkins, J.; Vance, A. Using fMRI to Measure Stimulus Generalization of Software Notification to Security Warnings. In Information Systems and Neuroscience. Lecture Notes in Information Systems and Organisation; Davis, F., Riedl, R., vom Brocke, J., Léger, P.M., Randolph, A., Fischer, T., Eds.; Springer: Berlin, Germany, 2020; Volume 32, pp. 93–99. [Google Scholar]
- Krol, K.; Moroz, M.; Sasse, M.A. Don’t Work, Can’t Work? Why It’s Time to Rethink Security Warnings. In Proceedings of the 7th International Conference on Risk and Security Warning of Internet and Systems (CRiSIS), Cork, Ireland, 10–12 October 2012. [Google Scholar]
- Whitten, A.; Tygar, J.D. Why Johny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, 23–26 August 1999; pp. 169–184. [Google Scholar]
- Wu, M.; Miller, C.R.; Garfinkel, S.L. Do Security Toolbars Actually Prevent Phishing Attacks. In Proceedings of the SIGCHI Conference of Human Factors in Computing System, Montréal, QC, Canada, 22–27 April 2006; pp. 601–610, ISBN 1-59593-372-7. [Google Scholar]
- Brustoloni, J.C.; Villamarin-Salomon, R. Improving Security Decision with Polymorphic and Audited Dialogs. In Proceedings of the 3rd Symposium on Usable Privacy and Security, Pittsburg, PA, USA, 18–20 July 2007; pp. 76–85. [Google Scholar]
- Furnell, S.M.; Jusoh, A.; Katsabas, A. The Challenge of Understanding and Using Security: A Survey of End-Users. Comput. Secur. 2006, 25, 27–35. [Google Scholar] [CrossRef]
- Herley, C. So Long and No Thanks for the Externalities: The Rational Rejections of Security Advice by Users. In Proceedings of the 2009 Workshop on New Security Paradigms Workshop, Oxford, UK, 8–11 September 2009; pp. 133–144. [Google Scholar]
- Mesbah, S. Internet Science-Creating better Browser Warnings, Seminar Future Internet WS1415; Network Architecture and Services: Munich, Germany, 2015. [Google Scholar]
- Zurko, M.E.; Kaufman, C.; Spanbauer, K.; Basset, C. Did You Ever Have to Make Up Your Mind? What Notes Users do When Face with a Security Decision. In Proceedings of the 18th Annual Computer Security Application Conference, Las Vegas, NV, USA, 9–13 December 2002. [Google Scholar]
- Wash, R.; Rader, E. Influencing mental models of security: A research agenda. In Proceedings of the 2011 New Security Paradigms Workshop, New York, NY, USA, 12–15 September 2011; ACM: New York, NY, USA, 2011; pp. 57–66. [Google Scholar]
- De Luca, A.; Das, S.; Mellon, C.; Ortlieb, M.; Ion, L.; Laurie, B. Expert and Non-Expert Attitudes towards (Secure) Instant Messaging. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Denver, CO, USA, 22–24 June 2016; ISBN 978-1-931971-31-7. [Google Scholar]
- Jenkins, J.L.; Anderson, B.B.; Vance, A. More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable. Inf. Syst. Res. 2016, 27, 880–896. [Google Scholar] [CrossRef] [Green Version]
- Biddle, R.; Van Oorschot, P.C.; Patrick, A.S.; Sobey, J.; Whalen, T. Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW’09, Chicago, IL, USA, 13 November 2009; pp. 19–30. [Google Scholar]
- Harbach, M.; Fahl, S.; Yakovleva, P.; Smith, M. Sorry, I Don’t Get It: An Analysis of Warning Message Texts. Int. Financ. Cryptogr. Data Secur. 2013, 7862, 94–111. [Google Scholar]
- Sobey, J.; Biddle, R.; van Oorschot, P.C.; Patrick, A.S. Exploring user reactions to new browser cues for extended validation certificates. In European Symposium on Research in Computer Security, Lecture Notes in Computer Science; Springer: Berlin, Germany, 2008; Volume 5283, pp. 411–427. [Google Scholar]
- Anderson, B.B.; Vance, A.; Kirwan, C.B.; Eargle, D.; Jenkins, J.L. How users perceive and respond to security messages: A NeuroIS research agenda and empirical study. Eur. J. Inf. Syst. 2016, 25, 364–390. [Google Scholar] [CrossRef]
- Downs, J.S.; Holbrook, M.B.; Cranor, L.F. Decision strategies and susceptibility to phishing. In Proceedings of the Second Symposium on Usable Privacy and Security, Pittsburgh, PA, USA, 12–14 July 2006; pp. 79–90. [Google Scholar]
- Asgharpour, F.; Liu, D.; Camp, L.J. Mental Models of Security Risks. In Financial Cryptography and Data Security. FC 2007. Lecture Notes in Computer Science; Dietrich, S., Dhamija, R., Eds.; Springer: Berlin/Heidelberg, Germany, 2007; Volume 4886, pp. 367–377. [Google Scholar]
- Bravo-Lillo, C.; Cranor, L.; Downs, J.; Komanduri, S. Poster: What is still wrong with security warnings: A mental models approach. In Proceedings of the 6th Symposium on Usable Privacy and Security (SOUPS), Redmond, WA, USA, 14–16 July 2010. [Google Scholar]
- Whalen, T.; Inkpen, K.M. Gathering evidence: Use of visual security cues in web browsers. In Proceedings of the Graphics Interface, Victoria, BC, Canada, 9–11 May 2005; pp. 137–144. [Google Scholar]
- West, R. The psychology of security. Commun. ACM 2008, 51, 34–40. [Google Scholar] [CrossRef]
- Shi, P.; Xu, H.; Zhang, X.L. Informing security indicator design in web browsers. In Proceedings of the 2011 iConference, Seattle, WA, USA, 8–11 February 2011; pp. 569–575. [Google Scholar]
- Reeder, R.W.; Felt, A.P.; Consolvo, S.; Malkin, N.; Thompson, C.; Egelman, S. An Experience Sampling Study of User Reactions to Browser Warnings in the Field. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Montreal, QC, Canada, 21–26 April 2018; pp. 1–13. [Google Scholar]
- Kauer, M.; Pfeiffer, T.; Volkamer, M.; Theuerling, H.; Bruder, R. It is not about the design—It is about the content! Making warnings more efficient by communicating risks appropriately. In SICHERHEIT 2012—Sicherheit, Schutz und Zuverlässigkeit; Suri, N., Waidner, M., Eds.; Gesellschaft für Informatik e.V.: Bonn, Germany, 2012; pp. 187–198. [Google Scholar]
- Egelman, S.; Schechter, S. The Importance of Being Earnest [In Security Warnings]. In Financial Cryptography and Data Security. FC 2013. Lecture Notes in Computer Science; Sadeghi, A.R., Ed.; Springer: Berlin, Germany, 2013; Volume 7859, pp. 52–59. [Google Scholar]
- Althobaiti, M.M.; Mayhew, P. Users’ Awareness of Visible Security Design Flaws. Int. J. Innov. Manag. Technol. 2016, 7, 96–100. [Google Scholar] [CrossRef]
- Sasse, M.A.; Brostoff, S.; Weirich, D. Transforming the ‘weakest link’—A human/computer interaction approach to usable and effective security. BT Technol. J. 2001, 19, 122–131. [Google Scholar] [CrossRef]
- Sharek, D.; Swofford, C.; Wogalter, M. Failure to recognize fake Internet popup warning messages. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 2008, 52, 557–560. [Google Scholar] [CrossRef] [Green Version]
- Amer, T.S.; Maris, J.M.B. Signal words and signal icons in application control and information technology exception messages—Hazard matching and habituation effects. J. Inf. Syst. 2007, 21, 1–25. [Google Scholar] [CrossRef] [Green Version]
- Akhawe, D.; Felt, A.P. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In Proceedings of the USENIX Security Symposium, Washington, DC, USA, 14–16 August 2013; pp. 257–272. [Google Scholar]
- Bravo-Lillo, C.; Komanduri, S.; Cranor, L.F.; Reeder, R.W.; Sleeper, M.; Downs, J.; Schechter, S. Your attention please: Designing security-decision UIs to make genuine risks harder to ignore. In Proceedings of the Ninth Symposium on Usable Privacy and Security, New York, NY, USA, 24–26 July 2013; pp. 1–12. [Google Scholar]
- Anderson, B.B.; Kirwan, C.B.; Jenkins, J.L.; Eargle, D.; Howard, S.; Vance, A. How polymorphic warning reduce habituation in the brain: Insights from fMRI study. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul, Korea, 18–23 April 2015; pp. 2883–2892. [Google Scholar]
- Anderson, B.B.; Vance, T.; Kirwan, B.; Eargle, D.; Howard, S. Users aren’t (necessarily) lazy: Using neurois to explain habituation to security warnings. In Proceedings of the Thirty Fifth International Conference on Information Systems, Auckland, NZ, USA, 14–17 December 2014; pp. 1–15. [Google Scholar]
- Amran, A. Improving Security Warning Using Polymorphic and Iterative Design: Habituation Effects. Undergraduate Degree Thesis, Universiti Sains Malaysia, School of Computer Science, Penang, Malaysia, 2017. [Google Scholar]
- Vance, A.; Kirwan, B.; Bjornn, D.; Jenkins, J.; Anderson, B.B. What do we really know about how habituation to warnings occurs over time? A longitudinal fMRI study of habituation and polymorphic warnings. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, CO, USA, 6–11 May 2017; pp. 2215–2227. [Google Scholar]
- Nielsen, J. Usability 101: Introduction to Usability. 2012. Available online: https://www.nngroup.com/articles/usability-101-introduction-to-usability/ (accessed on 4 March 2020).
- Zhang-Kennedy, L.; Chiasson, S.; Biddle, R. The role of instructional design in persuasion: A comics approach for improving cybersecurity. Int. J. Hum. Comput. Interact. 2016, 32, 215–257. [Google Scholar] [CrossRef]
- Webber, S.; Harbach, M.; Smith, M. Participatory Design for Security-Related User Interfaces. In Proceedings of the Internet Society, USEC’15, San Diego, CA, USA, 8 February 2015; pp. 1–6. [Google Scholar]
- Morgan, M.G.; Fischhoff, B.; Bostrom, A.; Atman, C.J. Risk Communication: A Mental Models Approach; Cambridge University Press: Cambridge, MA, USA, 2001. [Google Scholar]
- Merritt, J. What Are Mental Models? 2010. Available online: https://thesystemsthinker.com/what-are-mental-models/ (accessed on 3 July 2020).
- Wash, R. Folks Models of Home Computer Security. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Redmond, WA, USA, 14–16 July 2010; pp. 1–16. [Google Scholar]
- Blythe, J.; Camp, L.J. Implementing mental models. In Proceedings of the 2012 IEEE Symposium on Security and Privacy workshops (SPW), San Francisco, CA, USA, 24–25 May 2012; pp. 86–90. [Google Scholar]
- Wilson, G.; Maxwell, H.; Just, M. Everything’s Cool: Extending Security Warnings with Thermal Feedback. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, Denver, CO, USA, 6–11 May 2017; pp. 2232–2239. [Google Scholar]
- Keukelaere, D.F.; Yoshihama, S.; Trent, S.; Zhang, Y.; Luo, L.; Zurko, M.E. Adaptive security dialogs for improved security behavior of users. In Proceedings of the IFIP Conference on Human-Computer Interaction, Uppsala, Sweden, 24–28 August 2009; pp. 510–523. [Google Scholar]
- Eargle, D.; Galletta, D.; Kirwan, B.; Vance, A.; Jenkins, J. Integrating Facial Cues of Threat into Security Warnings–An fMRI and Field Study. In Proceedings of the Twenty-second Americas Conference on Information Systems, San Diego, CA, USA, 11–14 August 2016; pp. 1–5. [Google Scholar]
- Minakawa, R.; Takada, T. Exploring alternative security warning dialog for attracting user attention: Evaluation of Kawaii effect and its additional stimulus combination. In Proceedings of the 19th International Conference on Information Integration and Web-based Applications & Services, Salzburg, Austria, 4–6 December 2017; pp. 582–586. [Google Scholar]
- Gorski, P.L.; Iacono, L.L.; Wermke, D.; Stransky, C.; Möller, S.; Acar, Y.; Fahl, S. Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. In Fourteenth Symposium on Usable Privacy and Security (SOUPS); USENIX Association: Baltimore, MD, USA, 2018; pp. 265–281. [Google Scholar]
- Gorski, P.L.; Iacono, L.L.; Acar, Y.; Fahl, S. Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs. In Proceedings of the CHI’20: 2020 CHI Conference on Human Factors in Computing Systems, Honolulu, HI, USA, 25–30 April 2020; pp. 1–13. [Google Scholar]
- Johnston, J.; Eloff, J.; Labuschagne, L. Security and human computer interfaces. Comput. Secur. 2003, 22, 675–684. [Google Scholar] [CrossRef]
- Garfinkel, S.; Lipford, H.R. Usable security: History, themes, and challenges. Synth. Lect. Inf. Secur. Priv. Trust. 2014, 5, 1–124. [Google Scholar] [CrossRef]
- Mitnick. Mitnick: The Human Link’s The Weakest (in InformationWeek). 2000. Available online: https://www.informationweek.com/mitnick-the-human-links-the-weakest/d/d-id/1009229 (accessed on 25 October 2021).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zaaba, Z.F.; Lim Xin Yi, C.; Amran, A.; Omar, M.A. Harnessing the Challenges and Solutions to Improve Security Warnings: A Review. Sensors 2021, 21, 7313. https://doi.org/10.3390/s21217313
Zaaba ZF, Lim Xin Yi C, Amran A, Omar MA. Harnessing the Challenges and Solutions to Improve Security Warnings: A Review. Sensors. 2021; 21(21):7313. https://doi.org/10.3390/s21217313
Chicago/Turabian StyleZaaba, Zarul Fitri, Christine Lim Xin Yi, Ammar Amran, and Mohd Adib Omar. 2021. "Harnessing the Challenges and Solutions to Improve Security Warnings: A Review" Sensors 21, no. 21: 7313. https://doi.org/10.3390/s21217313
APA StyleZaaba, Z. F., Lim Xin Yi, C., Amran, A., & Omar, M. A. (2021). Harnessing the Challenges and Solutions to Improve Security Warnings: A Review. Sensors, 21(21), 7313. https://doi.org/10.3390/s21217313