How Polymorphic Warnings Reduce Habituation in the Brain-Insights from an fMRI Study

被引:52
作者
Anderson, Bonnie Brinton [1 ]
Kirwan, C. Brock [1 ]
Jenkins, Jeffrey L. [1 ]
Eargle, David [2 ]
Howard, Seth [3 ]
Vance, Anthony [1 ]
机构
[1] Brigham Young Univ, Provo, UT 84602 USA
[2] Univ Pittsburgh, Pittsburgh, PA 15260 USA
[3] Google Inc, Mountain View, CA USA
来源
CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS | 2015年
基金
美国国家科学基金会;
关键词
Security warnings; habituation; functional magnetic resonance imaging (fMRI); mouse cursor tracking; REPETITION; MECHANISMS; SOFTWARE; MEMORY;
D O I
10.1145/2702123.2702322
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Research on security warnings consistently points to habituation as a key reason why users ignore security warnings. However, because habituation as a mental state is difficult to observe, previous research has examined habituation indirectly by observing its influence on security behaviors. This study addresses this gap by using functional magnetic resonance imaging (fMRI) to open the "black box" of the brain to observe habituation as it develops in response to security warnings. Our results show a dramatic drop in the visual processing centers of the brain after only the second exposure to a warning, with further decreases with subsequent exposures. To combat the problem of habituation, we designed a polymorphic warning that changes its appearance. We show in two separate experiments using fMRI and mouse cursor tracking that our polymorphic warning is substantially more resistant to habituation than conventional warnings. Together, our neurophysiological findings illustrate the considerable influence of human biology on users' habituation to security warnings.
引用
收藏
页码:2883 / 2892
页数:10
相关论文
共 27 条
[11]  
Dimoka A, 2012, MIS QUART, V36, P679
[12]   MouseTracker: Software for studying real-time mental processing using a computer mouse-tracking method [J].
Freeman, Jonathan B. ;
Ambady, Nalini .
BEHAVIOR RESEARCH METHODS, 2010, 42 (01) :226-241
[13]   Repetition and the brain: neural models of stimulus-specific effects [J].
Grill-Spector, K ;
Henson, R ;
Martin, A .
TRENDS IN COGNITIVE SCIENCES, 2006, 10 (01) :14-23
[14]  
Guo Q., 2010, Proceedings of the 28th of the international conference extended abstracts on Human factors in computing systems - CHI EA'10 p, P3601, DOI [DOI 10.1145/1753846.1754025, DOI 10.1145/1753846]
[15]  
Herley C, 2009, NEW SECURITY PARADIGMS WORKSHOP 2009, PROCEEDINGS, P133
[16]  
Kalsher MJ, 2006, HUM FAC ER, P313
[17]   Neuroscience - The molecular biology of memory storage: A dialogue between genes and synapses [J].
Kandel, ER .
SCIENCE, 2001, 294 (5544) :1030-1038
[18]   INFERIOR TEMPORAL MECHANISMS FOR INVARIANT OBJECT RECOGNITION [J].
LUESCHOW, A ;
MILLER, EK ;
DESIMONE, R .
CEREBRAL CORTEX, 1994, 4 (05) :523-531
[19]   Internet users' information privacy concerns (IUIPC): Tthe construct, the scale, and a causal model [J].
Malhotra, NK ;
Kim, SS ;
Agarwal, J .
INFORMATION SYSTEMS RESEARCH, 2004, 15 (04) :336-355
[20]   Neuroscience and the future of human-computer interaction [J].
Minnery, Brad S. ;
Fine, Michael S. .
Interactions, 2009, 16 (02) :70-75