Reading this may harm your computer: The psychology of malware warnings

Computers in Human Behavior - Tập 41 - Trang 71-79 - 2014
David Modic1, Ross Anderson1
1University of Cambridge, Computer Laboratory, JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom

Tài liệu tham khảo

Akhawe, 2013, Alice in Warningland: A large-scale field study of browser security warning effectiveness Anderson, 2003, The psychology of doing nothing: Forms of decision avoidance result from reason and emotion, Psychological Bulletin, 129, 139, 10.1037/0033-2909.129.1.139 Asch, 1956, Studies of independence and conformity: I. A minority of one against a unanimous majority, Psychological Monographs: General and Applied, 70, 1, 10.1037/h0093718 Bauer, 2013 Bearden, 1989, Measurement of consumer susceptibility to interpersonal influence, Journal of Consumer Research, 15, 473, 10.1086/209186 Beautement, 2008, The compliance budget: Managing security behaviour in organisations Bhatnagar, 2000, On risk, convenience, and Internet shopping behavior – Why some consumers are online shoppers while others are not, Communications of the Acm, 43, 98, 10.1145/353360.353371 Box, 1964, An analysis of transformations, Journal of the Royal Statistical Society. Series B (Methodological), 26, 211, 10.1111/j.2517-6161.1964.tb00553.x Bravo-Lillo, 2013, Your attention please: Designing security-decision UIs to make genuine risks harder to ignore, 18 Camerer, 1999, Overconfidence and excess entry: An experimental approach, The American Economic Review, 89, 306, 10.1257/aer.89.1.306 Cialdini, 2001 Cohen, 1979, Social change and crime rate trends: A routine activity approach, American Sociological Review, 44, 588, 10.2307/2094589 Egelman, 2008 Egelman, 2010, Please continue to hold: An empirical study on user tolerance of security delays Egelman, 2013, The importance of being earnest [in security warnings] Ert, 2008, The rejection of attractive gambles, loss aversion, and the lemon avoidance heuristic, Journal of Economic Psychology, 29, 715, 10.1016/j.joep.2007.06.003 Felson, 1998, Opportunity makes the thief: Practical theory for crime prevention, 44 Fischer, 2013, Why do individuals respond to fraudulent scam communication and lose money? The psychological determinants of scam compliance, Journal of Applied Social Psychology, 43, 2060, 10.1111/jasp.12158 Fischer, 2009, The psychology of scams: Provoking and committing errors of judgement, 260 Garbarino, 2004, Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation, Journal of Business Research, 57, 768, 10.1016/S0148-2963(02)00363-6 Gustafson, 1998, Gender differences in risk perception: Theoretical and methodological perspectives, Risk Analysis, 18, 805, 10.1023/B:RIAN.0000005926.03250.c0 Halpern, 2007, Harnessing the power of default options to improve health care, New England Journal of Medicine, 357, 1340, 10.1056/NEJMsb071595 Harwell, 2003, Summarizing monte carlo results in methodological research: The single-factor, fixed-effects ANCOVA case, Journal of Educational and Behavioral Statistics, 28, 45, 10.3102/10769986028001045 Herley, 2010, The plight of the targeted attacker in a world of scale Herley, 2009, So long, and no thanks for the externalities: The rational rejection of security advice by users Jagatic, 2007, Social phishing, Communications of the Acm, 50, 94, 10.1145/1290958.1290968 Johnson, 2002, Defaults, framing and privacy: Why opting in-opting out, Marketing Letters, 13, 5, 10.1023/A:1015044207315 Jost, 2004, A decade of system justification theory: Accumulated evidence of conscious and unconscious bolstering of the status quo, Political Psychology, 25, 881, 10.1111/j.1467-9221.2004.00402.x Kahan, 1997, Social influence, social meaning, and deterrence, Virginia Law Review, 83, 349, 10.2307/1073780 Kahneman, 1991, Anomalies: The endowment effect, loss aversion, and status quo bias, Journal of Economic Perspectives, 5, 193, 10.1257/jep.5.1.193 Kahneman, 1979, Prospect theory: An analysis of decision under risk, Econometrica, 47, 263, 10.2307/1914185 Kim, 2008, Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study, Journal of Management Information Systems, 24, 13, 10.2753/MIS0742-1222240401 Kirk, 2013 Koslowsky, 2001, On the relationship between subordinates’ compliance to power sources and organisational attitudes, Applied Psychology: An International Review, 50, 455, 10.1111/1464-0597.00067 Krol, K., Moroz, M., & Sasse, M. A. (2012). Don’t work. Can’t work? Why it’s time to rethink security warnings. In: risk and security of internet and systems (CRiSIS), 2012 7th International conference on (pp. 1–8). Lee, 2004, Trust in automation: Designing for appropriate reliance, Human Factors, 46, 50, 10.1518/hfes.46.1.50.30392 Lix, 1996, Consequences of assumption violations revisited: A quantitative review of alternatives to the one-way analysis of variance F test, Review of Educational Research, 66, 579 Mariani, 2006, Risk perception in online shopping, 207 Markus, 1991, Culture and the self: Implications for cognition, emotion, and motivation, Psychological Review, 98, 224, 10.1037/0033-295X.98.2.224 Modic, 2013 Modic, D., & Lea, S. E. G. (2013). Scam Compliance and the Psychology of Persuasion [pre-print]. Social Sciences Research Network, Available at SSRN: <http://ssrn.com/abstract=2364464>. Munro, 2009, Hardcover ed., Vol. 12 Murphy, 2004, The role of trust in nurturing compliance: A study of accused tax avoiders, Law and Human Behavior, 28, 187, 10.1023/B:LAHU.0000022322.94776.ca Osborne, 2010, Improving your data transformations: Applying the box-cox transformation, Practical Assessment Research and Evaluation, 15, 9 Raven, 1998, Conceptualizing and measuring a power/interaction model of interpersonal influence 1, Journal of Applied Social Psychology, 28, 307, 10.1111/j.1559-1816.1998.tb01708.x Rubinstein, 1997 Samuelson, 1988, Status quo bias in decision making, Journal of Risk and Uncertainty, 1, 7, 10.1007/BF00055564 Schmider, 2010, Is it really robust?, Methodology: European Journal of Research Methods for the Behavioral and Social Sciences, 6, 147, 10.1027/1614-2241/a000016 Simon, 1956, Rational choice and the structure of the environment, Psychological Review, 63, 129, 10.1037/h0042769 Spool, J. (2011). Do users change their settings?. In: J. M. Spool (Ed.), User Interface Engineering (Vol. 2013). User Interface Engineering. <www.uie.com>. Stevenson, 2000 Sunshine, 2009, Crying wolf: An empirical study of SSL warning effectiveness Tabachnick, 2005 Thaler, 2008 Titus, 2001, Personal fraud: The victims and the scams, Crime Prevention Studies, 12, 133 Triandis, 1986, The measurement of the etic aspects of individualism and collectivism across cultures, Australian Journal of Psychology, 38, 257, 10.1080/00049538608259013 Tyler, 1995, Collective restraint in social dilemmas: Procedural justice and social identification effects on support for authorities, Journal of Personality and Social Psychology, 69, 482, 10.1037/0022-3514.69.3.482 Wu, 2008, Factors affecting members’ trust belief and behaviour intention in virtual communities, Behaviour and Information Technology, 27, 115, 10.1080/01449290600961910 Zuckoff, 2005, Annals of crime: The perfect mark, Vol. 82, 36