How Polymorphic Warnings Reduce Habituation in the Brain-Insights from an fMRI Study

被引:51
作者
Anderson, Bonnie Brinton [1 ]
Kirwan, C. Brock [1 ]
Jenkins, Jeffrey L. [1 ]
Eargle, David [2 ]
Howard, Seth [3 ]
Vance, Anthony [1 ]
机构
[1] Brigham Young Univ, Provo, UT 84602 USA
[2] Univ Pittsburgh, Pittsburgh, PA 15260 USA
[3] Google Inc, Mountain View, CA USA
来源
CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS | 2015年
基金
美国国家科学基金会;
关键词
Security warnings; habituation; functional magnetic resonance imaging (fMRI); mouse cursor tracking; REPETITION; MECHANISMS; SOFTWARE; MEMORY;
D O I
10.1145/2702123.2702322
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Research on security warnings consistently points to habituation as a key reason why users ignore security warnings. However, because habituation as a mental state is difficult to observe, previous research has examined habituation indirectly by observing its influence on security behaviors. This study addresses this gap by using functional magnetic resonance imaging (fMRI) to open the "black box" of the brain to observe habituation as it develops in response to security warnings. Our results show a dramatic drop in the visual processing centers of the brain after only the second exposure to a warning, with further decreases with subsequent exposures. To combat the problem of habituation, we designed a polymorphic warning that changes its appearance. We show in two separate experiments using fMRI and mouse cursor tracking that our polymorphic warning is substantially more resistant to habituation than conventional warnings. Together, our neurophysiological findings illustrate the considerable influence of human biology on users' habituation to security warnings.
引用
收藏
页码:2883 / 2892
页数:10
相关论文
共 27 条
[1]  
Akhawe Devdatta., 2013, Alice in warningland: A large-scale field study of browser security warning effectiveness, P257
[2]  
[Anonymous], P 9 S US PRIV SEC
[3]  
Bravo-Lillo C, 2011, LECT NOTES COMPUT SC, V6949, P18, DOI 10.1007/978-3-642-23768-3_2
[4]  
Bravo-Lillo Cristian., 2014, P 10 S US PRIV SEC J, P105
[5]  
Brustoloni J.C., 2007, Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS'07, P76
[6]   The brain's default network - Anatomy, function, and relevance to disease [J].
Buckner, Randy L. ;
Andrews-Hanna, Jessica R. ;
Schacter, Daniel L. .
YEAR IN COGNITIVE NEUROSCIENCE 2008, 2008, 1124 :1-38
[7]   Top-down versus bottom-up control of attention in the prefrontal and posterior parietal cortices [J].
Buschman, Timothy J. ;
Miller, Earl K. .
SCIENCE, 2007, 315 (5820) :1860-1862
[8]   AFNI: Software for analysis and visualization of functional magnetic resonance neuroimages [J].
Cox, RW .
COMPUTERS AND BIOMEDICAL RESEARCH, 1996, 29 (03) :162-173
[10]  
Dimoka A, 2012, MIS QUART, V36, P811