Podrobná bibliografie
| Název: |
THE FOG OF WARNINGS: HOW NON-SECURITY-RELATED NOTIFICATIONS DIMINISH THE EFFICACY OF SECURITY WARNINGS. |
| Autoři: |
Vance, Anthony1 anthony@vance.name, Eargle, Dave2 dave@daveeargle.com, Kirwan, C. Brock3 bkirwan@sas.upenn.edu, Anderson, Bonnie Brinton4 bonnie_anderson@byu.edu, Jenkins, Jeffrey L.5 jeffrey_jenkins@byu.edu |
| Zdroj: |
MIS Quarterly. Dec2025, Vol. 49 Issue 4, p1357-1384. 28p. 20 Color Photographs, 1 Diagram, 6 Charts. |
| Témata: |
WARNINGS, INTERNET security, HABITUATION (Neuropsychology), FUNCTIONAL magnetic resonance imaging, STIMULUS generalization |
| Abstrakt: |
Users’ disregard of security warnings is a critical problem in cybersecurity. This problem worsens when people confuse security warnings with common, non-security-related notifications, which they learn to routinely disregard. We investigate this problem through the neurobiological phenomenon of generalization of habituation, where habituation to one stimulus transfers to another stimulus that shares similar characteristics. Generalization of habituation suggests that because of habituation to frequent notifications, people may also be deeply habituated to security warnings they have never seen before, leading to warning disregard. Furthermore, because generalization of habituation occurs unconsciously at the neurobiological level, this may occur even though a person can consciously distinguish security warnings from notifications. We address this problem through three experiments—two in the field and one using functional magnetic resonance imaging. These experiments demonstrate how generalization of habituation occurs and can be mitigated by differentiating warnings from notifications in terms of their visual appearance or mode of interaction. These findings provide guidance to software developers for designing warnings that resist generalization of habituation and promote greater warning adherence. Keywords: Security warning, habituation, generalization, fMRI, field experiment, NeuroIS [ABSTRACT FROM AUTHOR] |
|
Copyright of MIS Quarterly is the property of MIS Quarterly and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) |
| Databáze: |
Business Source Index |