Skip to main content

The Challenge of Increasing Safe Response of Antivirus Software Users

  • Conference paper
Mathematical and Engineering Methods in Computer Science (MEMICS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9548))

  • 580 Accesses

Abstract

While antivirus software is an essential part of nearly every computer, users often ignore its warnings and they are often unable to make a safe response when interacting with antivirus software. The aim of our study was to find working connections to increase a number of mobile device users who select a premium license with more security features over a free license with a limited level of security. We cooperated with the antivirus company ESET and more than fourteen thousand users participated in first phase of our experiment. We tested two new types of a user dialog on the Android platform. The first user dialog was designed with a text change and the other with a new button “Ask later”. As a result, we found out that the text change increased the number of premium license purchases by 66 % in the first phase of our experiment, the version with the “Ask later” button increased this number by 25 % in the same period.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying wolf: an empirical study of ssl warning effectiveness. In: USENIX Security Symposium, pp. 399–416 (2009)

    Google Scholar 

  2. Sotirakopoulos, A., Hawkey, K., Beznosov, K.: On the challenges in usable security lab studies: lessons learned from replicating a study on ssl warnings. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 3. ACM (2011)

    Google Scholar 

  3. Amer, T., Maris, J.-M.B.: Signal words and signal icons in application control and information technology exception messages-hazard matching and habituation effects”. J. Inf. Syst. 21(2), 1–25 (2007)

    Google Scholar 

  4. Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S., Sleeper, M.: Improving computer security dialogs. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011, Part IV. LNCS, vol. 6949, pp. 18–35. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  5. Wogalter, M.S., Desaulniers, D.R., Brelsford, J.W.: Consumer products: how are the hazards perceived? In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 31, no. 5, pp. 615–619 (1987)

    Google Scholar 

  6. Wogalter, M.: Handbook of Warnings. Human Factors and Ergonomics. Taylor & Francis, London (2006)

    Google Scholar 

  7. Bravo-Lillo, C., Komanduri, S., Cranor, L.F., Reeder, R.W., Sleeper, M., Downs, J., Schechter, S.: Your attention please: designing security-decision uis to make genuine risks harder to ignore. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS 2013, pp. 6:1–6:12. ACM, New York (2013)

    Google Scholar 

  8. Wogalter, M.S., Conzola, V.C., Smith-Jackson, T.L.: Research-based guidelines for warning design and evaluation. Appl. Ergon. 33, 219–230 (2002)

    Article  Google Scholar 

  9. Kline, P.B., Braun, C.C., Peterson, N., Silver, N.C.: The impact of color on warnings research. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 37, no. 14, pp. 940–944 (1993)

    Google Scholar 

  10. Tan, J., Nguyen, K., Theodorides, M., Negrón-Arroyo, H., Thompson, C., Egelman, S., Wagner, D.: The effect of developer-specified explanations for permission requests on smartphone user behavior. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2014, pp. 91–100. ACM, New York (2014)

    Google Scholar 

  11. Wiebe, E.N., Shaver, E.F., Wogalter, M.S.: People’s beliefs about the internet: surveying the positive and negative aspects. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting vol. 45, no. 15, pp. 1186–1190 (2001)

    Google Scholar 

  12. Nielsen, J.: How users read on the web (1997). http://www.nngroup.com/articles/how-users-read-on-the-web/. Accessed 1 December 2014

  13. Nielsen, J.: F-shaped pattern for reading web content (2006). http://www.nngroup.com/articles/f-shaped-pattern-reading-web-content/. Accessed 1 December 2014

  14. Cialdini, R.: Influence: The Psychology of Persuasion. HarperCollins, New York (2009)

    Google Scholar 

  15. Ariely, D.: Predictably Irrational, Revised and Expanded Edition: The Hidden Forces That Shape Our Decisions. Harper Perennial/Harper Collins, New York (2010)

    Google Scholar 

  16. Gilbert, D.T., Ebert, J.E.: Decisions and revisions: the affective forecasting of changeable outcomes. J. Pers. Soc. Psychol. 82(4), 503 (2002)

    Article  Google Scholar 

  17. Corder, G., Foreman, D.: Nonparametric Statistics: A Step-by-Step Approach. Wiley, Hoboken (2014)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vlasta Stavova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Stavova, V., Matyas, V., Malinka, K. (2016). The Challenge of Increasing Safe Response of Antivirus Software Users. In: Kofroň, J., Vojnar, T. (eds) Mathematical and Engineering Methods in Computer Science. MEMICS 2015. Lecture Notes in Computer Science(), vol 9548. Springer, Cham. https://doi.org/10.1007/978-3-319-29817-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-29817-7_12

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-29816-0

  • Online ISBN: 978-3-319-29817-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics