Skip to main content

Stop Clicking on “Update Later”: Persuading Users They Need Up-to-Date Antivirus Protection

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8462))

Abstract

Online security advice aims to persuade users to behave securely, but appears to have limited effects at changing behaviour. We propose security advice targeted at end-users should employ visual rhetoric to form an effective, memorable, and persuasive method of communication. We present the design and evaluation of infographics and an online interactive comic developed to persuade users to update their antivirus software. Results show superior learning and behavioural outcomes compared to mainstream text-only security advice.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armitage, C.J., Conner, M.: Efficacy of the theory of planned behaviour: A meta-analytic review. British Journal of Social Psychology 40(4), 471–499 (2001)

    Article  Google Scholar 

  2. Balebako, R., Jung, J., Lu, W., Cranor, L.F., Nguyen, C.: Little brothers watching you: Raising awareness of data leaks on smartphones. In: Symposium on Usable Privacy and Security (2013)

    Google Scholar 

  3. Bogost, I.: Persuasive games: The expressive power of videogames. MIT Press (2007)

    Google Scholar 

  4. Chiasson, S., Forget, A., Biddle, R., van Oorschot, P.C.: Influencing users towards better passwords: Persuasive Cued Click-Points. In: British HCI, pp. 121–130. British Computer Society (2008)

    Google Scholar 

  5. Chiasson, S., van Oorschot, P.C., Biddle, R.: A usability study and critique of two password managers. In: USENIX Security Symposium (2006)

    Google Scholar 

  6. Craik, K., James, W.: The nature of explanation. Cambridge Univ. Press (1967)

    Google Scholar 

  7. Crano, W.D., Prislin, R.: Attitudes and persuasion. Annual Review of Psychology 57, 345–374 (2006)

    Article  Google Scholar 

  8. Eisner, W.: Comics & Sequential Art. Poorhouse Press, Tamarac (1985)

    Google Scholar 

  9. Fogg, B.J.: Persuasive Technology: Using Computers to Change What We Think and Do. Morgan Kaufmann, San Francisco (2003)

    Google Scholar 

  10. Fogg, B.J.: A behavior model for persuasive design. In: Persuasive Technology, p. 40. ACM (2009)

    Google Scholar 

  11. Forget, A., Chiasson, S., van Oorschot, P.C., Biddle, R.: Persuasion for stronger passwords: Motivation and pilot study. In: Oinas-Kukkonen, H., Hasle, P., Harjumaa, M., Segerståhl, K., Øhrstrøm, P. (eds.) PERSUASIVE 2008. LNCS, vol. 5033, pp. 140–150. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  12. Gustafson, K.L., Branch, R.M.: What is instructional design? In: Trends and Issues in Instructional Design and Technology, pp. 16–25 (2002)

    Google Scholar 

  13. Kelley, P.G., Bresee, J., Cranor, L.F., Reeder, R.W.: A nutrition label for privacy. In: Symposium on Usable Privacy and Security. ACM (2009)

    Google Scholar 

  14. Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology 10(2), 7 (2010)

    Article  Google Scholar 

  15. Logical PC Solutions. 5 Popular Computer Virus Misconceptions, http://www.logicalpcs.com/2012/03/07/5-popular-computer-virus-misconceptions/ (accessed June 2013)

  16. Pastor-Satorras, R., Vespignani, A.: Epidemic spreading in scale-free networks. Physical Review Letters 86(14), 3200 (2001)

    Article  Google Scholar 

  17. Raja, F., Hawkey, K., Hsu, S., Wang, K.L.C., Beznosov, K.: A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings. In: Symposium on Usable Privacy and Security. ACM (2011)

    Google Scholar 

  18. Scott, L.M.: Images in advertising: The need for a theory of visual rhetoric. Journal of Consumer Research, 252–273 (1994)

    Google Scholar 

  19. Smiciklas, M.: The power of infographics: Using pictures to communicate and connect with your audiences. Que Publishing (2012)

    Google Scholar 

  20. Srikwan, S., Jakobsson, M.: Using cartoons to teach internet security. Cryptologia 32(2), 137–154 (2008)

    Article  Google Scholar 

  21. Tembhurne, R.: 15 Myths and Misconceptions about Viruses and Security Applications (2013), http://rakesh.tembhurne.com/15-myths-and-misconceptions-about-viruses-and-security-applications/ (accessed June 2013)

  22. Versipass. Secure Comics, http://www.versipass.com/edusec

  23. Whitten, A., Tygar, J.D.: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In: USENIX Security Symposium (1999)

    Google Scholar 

  24. Wikipedia. Antivirus Software, https://en.wikipedia.org/wiki/Antivirus_software (accessed June 2013)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhang-Kennedy, L., Chiasson, S., Biddle, R. (2014). Stop Clicking on “Update Later”: Persuading Users They Need Up-to-Date Antivirus Protection. In: Spagnolli, A., Chittaro, L., Gamberini, L. (eds) Persuasive Technology. PERSUASIVE 2014. Lecture Notes in Computer Science, vol 8462. Springer, Cham. https://doi.org/10.1007/978-3-319-07127-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07127-5_27

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07126-8

  • Online ISBN: 978-3-319-07127-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics