287
Views
3
CrossRef citations to date
0
Altmetric
Articles

Expert Sources in Warnings May Reduce the Extent of Identity Disclosure in Cyber Contexts

, , &

References

  • Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999). Privacy in e-commerce: Examining user scenarios and privacy preference. Proceedings of the 1st ACM conference on Electronic commerce, Denver, Colorado.
  • Acquisti, A., & Grossklags, J. (2005). Uncertainty, ambiguity and privacy. 4th Annual Workshop on Economics and Information Security (WEIS), Berkeley, CA.
  • Beldad, A., van der Geest, T., de Jong, M., & Steehouder, M. (2012). Shall I tell you where I live? Factors influencing the behavioral intention to disclose personal data for online government transactions. International Journal of Human–Computer Interaction, 28, 163–177.
  • Bettman, J. R., & Sujan, M. (1987). Effects of framing on evaluation of comparable and noncomparable alternatives by expert and novice consumers. Journal of Consumer Research, 14, 141–154.
  • Bisantz, A. M., & Seong, Y. (2001). Assessment of operator trust in and utilization of automated decision-aids under different framing conditions. International Journal of Industrial Ergonomics, 28, 85–97.
  • Boyle, R., & Bonacich, B. (1970). The development of trust and mistrust in mixed-motive games. Sociometery, 33, 123–139.
  • Bravo-Lillo, C., Cranor, L. F., Downs, J., & Komanduri, S. (2011). Bridging the gap in computer security warnings: A mental model approach. IEEE Security & Privacy Magazine, 9(2), 18–26.
  • Carpenter, S., Zhu, F., & Kolimi, S. (2014). Warnings as countermeasures to psychological cyber-attacks on personal identity information. Applied Ergonomics, 45(5), 1337–1342.
  • Carpenter, S., Zhu, F., & Zeng, M. (2016). Online warnings reduce identity disclosure, but disclosure is not related to risk perceptions. Annual conference of the Psychonomics Society, Granada, Spain.
  • Chaiken, S., & Maheswaran, D. (1994). Heuristic processing can bias systematic processing: Effects of source credibility, argument ambiguity, and task importance on attitude judgment. Journal of Personality and Social Psychology, 66, 460–473.
  • Chen, R., Wang, J., Herath, T., & Rao, H. (2011). An investigation of email processing from a risky decision making perspective. Decision Support Systems, 52, 73–81. doi:10.1016/j.dss.2011.05.005
  • Cialdini, R. B. (1993). Influence (Vol. 3). New York, NY: Harper Collins College Publisher.
  • Cialdini, R. B. (2001). Harnessing the science of persuasion. Harvard Business Review, 79, 72–81.
  • Costello, A. J., Hellier, E. J., Edworthy, J., & Coulson, N. (2002). Can food label design characteristics affect perceptions of genetically modified food? In P. T. McCabe (Ed.), Advances in ergonomics (pp. 442–446). London, UK: Taylor & Francis.
  • Cranor, L. F. (2008). A framework for reasoning about the human in the loop. UPSEC, 8, 1–15.
  • Culnan, M. J. (2000). Protecting privacy online: Is self-regulation working? Journal of Public Policy and Marketing, 19, 20–26.
  • Egelman, S., Cranor, L. F., & Hong, J. (2008). You’ve been warned: An empirical study of the effectiveness of web browser phishing warnings. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1065–1074). ACM.
  • Evil, A. Y., Shaver, E. F., & Wogalter, M. S. (2003). On trust in the Internet: Belief cues from domain suffixes and seals of approval. Proceedings of the Human Factors and Ergonomics Society 47th Annual Meeting. Raleigh, NC.
  • Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59, 451–474. doi:10.1016/S1071-5819(03)00111-3
  • Fiske, S. T. (1980). Attention and weight in person perception: The impact of negative and extreme behavior. Journal of Personality and Social Psychology, 38(6), 889–906. doi:10.1037/0022-3514.38.6.889
  • Fogg, B. J. (2009, April). A behavior model for persuasive design. In Proceedings of the 4th international Conference on Persuasive Technology (pp. 40–46). ACM.
  • French, J., & Raven, B. (1959). The bases of social power. In D. Cartwright (Ed.), Studies in social power (pp. 150–167). Oxford, England: University of Michigan.
  • Gabriel, I. J., & Nyshadham, E. (2008, January). A Cognitive Map of People’s Online Risk Perceptions and Attitudes: An Empirical Study. In Hawaii International Conference on System Sciences, Proceedings of the 41st Annual (pp. 274–274). IEEE.
  • Gefen, D. (2000). E-commerce: The role of familiarity and trust. Omega, 28(6), 725–737. doi:10.1016/S0305-0483(00)00021-9
  • Gefen, D. (2002). Reflections on the dimensions of trust and trustworthiness among online consumers. Data Base for Advances in Information Systems, 33(3), 38–53. doi:10.1145/569905.569910
  • Gefen, D., & Straub, D. (2004). Consumer trust in B2C e-commerce and the importance of social presence: Experiments in e-products and e-services. Omega, 32, 407–424. doi:10.1016/j.omega.2004.01.006
  • Golle, P. (2006). Revisiting the uniqueness of simple demographics in the US population. Proceedings of the 5th ACM workshop on Privacy in electronic society (pp. 77–80). Alexandria, VA: ACM.
  • Guadagno, R., & Cialdini, R. (2005). Online persuasion and compliance: Social influence on the internet and beyond. In Y. Amichai-Hamburger (Ed.), The social net: The social science of the internet (pp. 91–113). New York, NY: Oxford University Press.
  • Hardee, J. B., West, R., & Mayhorn, C. B. (2006). To download or not to download: An examination of computer security decision making. Interactions, 13(3), 32–37.
  • Hovland, C. I., & Weiss, W. (1951). The influence of source credibility on communication effectiveness. The Public Opinion Quarterly, 15, 635–650.
  • Hwang, Y. (2014). Understanding the different influences of online trust on loyalty by risk takers and risk avoiders. International Journal of Human-Computer Interaction, 30, 977–984.
  • Jagtman, H. M. (2012). Designing for safety: A new service for alarming and informing the population in case of emergency. Third International Engineering Systems Symposium, Delft, The Netherlands.
  • Khan, R. F., & Sutcliffe, A. (2014). Attractive agents are more persuasive. International Journal of Human–Computer Interaction, 30, 142–150.
  • Kim, S., & Wogalter, M. S. (2009). Habituation, dishabituation, and recovery effects in visual warnings. Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 53, No. 20, pp. 1612–1616). Raleigh, NC: Sage Publications.
  • Krol, K., Moroz, M., & Sasse, M. A. (2012, October). Don’t work. Can’t work? Why it’s time to rethink security warnings. 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS) (pp. 1–8). Cork, Ireland: IEEE.
  • La Porta, R., Lopez-de-Salines, F., Schleifer, A., & Vishny, R. (1997). Trust in organizations. AEA Papers and Proceedings, 333–338.
  • Langer, E. J. (1991). Mindfulness: Choice and control in everyday life. London, UK: Collins-Harvill.
  • Langer, E. J. (1992). Matters of the mind: Mindfulness/mindlessness in perspective. Consciousness and Cognition, 1, 289–305.
  • Lea, S., Fischer, P., & Evans, K. M. (2009). The economic psychology of scams. International Association for Research in Economic Psychology and the Society for the Advancement of Behavioral Economics, Nova Scotia, Canada.
  • Lee, J. D., & See, K. A. (2004). Trust in automation: Designing for appropriate reliance. Human Factors, 46, 50–80.
  • Lehto, M., & Miller, J. (1986). Warning Volume 1: Fundamentals, design, and evaluation methodologies. Ann Arbor, MI: Fuller Technical Publication.
  • Lipkus, I. M., & Hollands, J. G. (1998). The visual communication of risk. Journal of the National Cancer Institute. Monographs, 25, 149–163.
  • Lirtzman, S. I., & Shuv-Ami, A. (1986). Credibility of sources on communication on products’ safety hazards. Psychological Reports, 58, 707–718. doi:10.2466/pr0.1986.58.3.707
  • Locander, W. B., & Hermann, P. W. (1979). The effect of self-confidence and anxiety on information seeking in consumer risk reduction. Journal of Marketing Research, 16, 268–274.
  • Maheswaran, D., & Meyers-Levy, J. (1990). The influence of message framing and issue involvement. Journal of Marketing Research, 27(3), 361–367. doi:10.2307/3172593
  • March, J. G. (1994). Primer on decision making: How decisions happen. New York, NY: Simon and Schuster.
  • Maurer, M. E., De Luca, A., & Kempe, S. (2011, July). Using data type based security alert dialogs to raise online security awareness. Proceedings of the Seventh Symposium on Usable Privacy and Security (pp. 2). New York, NY: ACM.
  • Mayer, R. C., Davis, J. H., & Schoorman, F. (1995). An integrative model of organizational trust. Academy Of Management Review, 20(3), 709–734. doi:10.5465/AMR.1995.9508080335
  • McKnight, D. C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359. doi:10.1287/isre.13.3.334.81
  • Möller, S., Ben-Asher, N., Engelbrecht, K.-P., Englert, R., & Meyer, J. (2011). Modeling the behavior of users who are confronted with security mechanisms. Computers & Security, 30(4), 242–256.
  • Nurse, J. R. C., Creese, S., Goldsmith, M., & Lamberts, K. (2011). Trustworthy and effective communication of cybersecurity risks: A review. Proceedings of the 1st Workshop on Socio-Technical Aspects in Security & Trust (STAST) (pp. 60–68). Milan, Italy. doi:10.1109/STAST.2011.6059257
  • Office of Justice Programs: Bureau of Justice Statistics. (2006). Retrieved from www.bjs.gov
  • Office of Justice Programs: Bureau of Justice Statistics. (2014). Victims of identity theft. Retrieved from www.bjs.gov
  • Raven, B. H. (1993). The bases of power: Origins and recent developments. Journal of Social Issues, 49(4), 227–251. doi:10.1111/j.1540-4560.1993.tb01191.x
  • Rotter, J. (1971). Generalized expectancies for interpersonal trust. American Psychologist, 26, 443–452.
  • Sheehan, K. B. (2005). In poor health: An assessment of privacy policies at direct-to-consumer web sites. Journal of Public Policy & Marketing, 24(2), 273–283.
  • Shih, D.-H., Hsu, S.-F., Yen, D. C., & Lin, -C.-C. (2012). Exploring the individual’s behavior on self-disclosure online. International Journal of Human-Computer Interaction, 28, 627–645.
  • Siegrist, M., & Cvetovich, G. (2000). Perceptions of hazards: The role of social trust and knowledge. Risk Analysis, 20, 713–720.
  • Slovic, P. (1987). Perception of risk. Science, 236, 280–285. doi:10.1126/science.3563507
  • Spiekermann, S., Grossklags, J., & Berendt, B. (2001). E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior. Proceedings of the 3rd ACM Conference on Electronic Commerce, Tampa, Florida.
  • Sweeney, L. (2002). k-ANONYMITY: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 557–570.
  • Whalen, T., & Inkpen, K. M. (2005, May). Gathering evidence: Use of visual security cues in web browsers. In Proceedings of Graphics Interface 2005 (pp. 137–144). Waterloo, Ontario, Canada: Canadian Human–Computer Communications Society.
  • Wogalter, M. S. (2006a). Communication–Human information processing (C-HIP) model. In M. S. Wogalter (Ed.), Handbook of warnings (pp. 51–62). Mahwah, NJ: Erlbaum Associates.
  • Wogalter, M. S. (2006b). Handbook of warnings. Mahwah, NJ: Erlbaum Associates.
  • Wogalter, M. S., Kalsher, M. J., & Rashid, R. (1999). Effect of signal word and source attribution on judgments of warning credibility and compliance likelihood. International Journal of Industrial Ergonomics, 24(2), 185–192.
  • Wogalter, M. S., & Mayhorn, C. B. (2008). Trusting the internet: Cues affecting perceived credibility. International Journal of Technology and Human Interaction, 4(1), 75–93.
  • Wu, M. M., Miller, R. C., & Garfinkel, S. L. (2006). Do security toolbars actually prevent phishing attacks? Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems (pp. 601–610). doi:10.1145/1124772.1124863
  • Zhu, F., Carpenter, S., & Kolimi, S. (2015). Mindlessness attacks. Proceedings of the 6th International Conference on Applied Human Factors and Ergonomics (AHFE 2015) and the Affiliated Conferences, Las Vegas, NV.
  • Zhu, F., Carpenter, S., & Kulkarni, A. (2012). Understanding identity exposure in pervasive computing environments. Pervasive and Mobile Computing, 8, 777–794.
  • Zhu, F., Carpenter, S., Kulkarni, A., Chidambaram, C., & Pathak, S. (2009). Understanding and minimizing identity exposure in ubiquitous computing environments. 2009 International conference on mobile and ubiquitous systems: Computing, networking, and services, Toronto, Canada.
  • Zhu, F., Carpenter, S., Kulkarni, A., & Kolimi, S. (2011). Reciprocity attacks. Proceedings of the Symposium on Usable Privacy and Security, Pittsburgh, PA.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.