Advertisement

Fear as Emotion Assessment in Information Security Using Kansei Engineering Methodology

  • Nurjannatul Jannah Aqilah Md Saad
  • Mat Razali Noor Afiza
  • Khairul Khalil Ishak
  • Nor Asiakin Hasbullah
  • Norulzahrah Mohd Zainudin
  • Suzaimah Ramli
  • Norshahriah Wahab
  • Mohd Fahmi Mohamad Amran
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 739)

Abstract

Information security assessment needs to be further developed due to the increased need to improve information security. Human factors need to be considered in formulizing and establishing information security methodology. A preliminary study of fear as emotional assessment in information security using Kansei Engineering methodology was discussed in this paper. The concept of fear in information security was explored to better understand the emotion of fear, for the purpose of implementating it as user assessment. Based on the literature reviews, it shows that fear appeal does play a crucial role in changing an individual’s behaviour and attitude in the context of risk measures. However, too much induced fear could cause affect how much users comply to security policies. Therefore, it is vital to have the optimum level of fear appeal applied in information security. This study surveyed the relationship between fear level and users action in applying security measures and serve as preliminary study to use fear as emotion assessment in information security using Kansei Engineering.

Keywords

Fear Information Security Fear Appeals Kansei Engineering 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    AlHogail A. (2017). Managing Human Factor to Improve Information Security in Organization.Google Scholar
  2. 2.
    Boss S. R., Galetta D. F., Lowry P. B., Moody G. D. & Polak P. (2015). What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviour.Google Scholar
  3. 3.
    Carl Colwill (2009). Human factors in information security: The insider threat – Who you can trust these days, Information Security Technical Report, 14, 186-196.Google Scholar
  4. 4.
    Du H., Xu H., Rosson M. B. & Carroll J.M. (2013). Effects of fear appeals and point reference on the persuasiveness of IT security communications. In Intelligence and security Informatics (ISI), 2013 IEEE International Conference on (pp. 82-84). IEEE.Google Scholar
  5. 5.
    Dupuis M. J. Crossler R. E. & Endicott-Popovsjy B. (2016). Measuring the Human factor in information security and privacy. In System Sciences (HICCS), 2016 49th Hawaii International Conference on (pp. 3676-3685). IEEEGoogle Scholar
  6. 6.
    Herath T. & H. Raghav Rao (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125.Google Scholar
  7. 7.
    Huang D. L. Rau P. L. P., Salvendy G., Gao F. & Zhou J. (2011). Factors affecting perception of information security and their impacts on IT adoption and security practices. International Journal of Human-Computer Studies, 69(12), 870-883.Google Scholar
  8. 8.
    Ishak K.K., Noor Afiza M. R., Lokman A. M. & Toshiyuki K. (2016). Kansei Information Security Assessment (KISA): Characterizing Trust as Stimuli for User Emotional Assessment in Information Security. Indian Journal of Science and Technology, 9(S1).Google Scholar
  9. 9.
    Janis I. L. & Feshbach S. (1953). Effects of fear-arousing communications. The Journal of Abnormal and Social Psychology, 48(1), 78Google Scholar
  10. 10.
    Jenkins J. L., Grimes M., Proudfoot J. G. & Lowry P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystrokes-dynamics monitoring ad just-in-time fear appeals. Information Technology for Development, 20(2), 196-213.Google Scholar
  11. 11.
    Johnston A. C. & Warkentin M. (2010). Fear Appeals and Information security behaviours: an empirical study. MIS Quarterly, 549-566.Google Scholar
  12. 12.
    Keller P. A. & Block L. G. (1996). Increasing the Persuasiveness of Fear Appeals: The Effect of Arousal and Elaboration. Journal of Consumer Research, 22(4), 448-459.Google Scholar
  13. 13.
    Kruger H. A. & Kearney W. D. (2006). A prototype for assessing information security awareness. Computers and security, 25(4), 289-296.Google Scholar
  14. 14.
    Lokman A. M. & Kamarudin K. A. (2010). Kansei Affinity Cluster for Affective Product Design. In User Science and Engineering (iUSER), 2010 International Conference on (pp. 38-43). IEEE.Google Scholar
  15. 15.
    Lokman A. M. (2010). Design & Emotion: The Kansei Engineering Methodology. Malaysian Journal of Computing, 1(1), 1-11.Google Scholar
  16. 16.
    Milne S., Sheeran P. & Orbell S. (2000). Prediction and intervention in health-related behaviour: a meta-analytic review of protection motivation theory.Google Scholar
  17. 17.
    Noor N. L. M., Anitawati M. L. & Nagamachi M. (2008). Applying Kansei Engineering to Determine Emotional Signature of Online Clothing Websites. In ICEIS (5) (pp. 142-147).Google Scholar
  18. 18.
    Norman P., Boer H. & Seydel E. R. (2005). Protection Motivation Theory. In M. Conner, & P. Norman (Eds), Predicting Health Behaviour: Research and Practice with Social Cognition Models, 81-126. Maidenhead: Open University Press.Google Scholar
  19. 19.
    Ortony A. & Turner T.J. (1990) What’s basic about basic emotion, Psychological Reviews, 97(3), 315.Google Scholar
  20. 20.
    Rogers W. R. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Changes, The Journal of Psychology: Interdisciplinary and Applied, 91(1), 93-114.Google Scholar
  21. 21.
    Schafer P. J. (2013). Concept of Security, Human and Water Security in Israel and Jordan, Springer Briefs in Environment, Security, Development and Peace 3.Google Scholar
  22. 22.
    Schutte S. T., Eklund J., Axelsson J. R. & Nagamachi M. (2004). Concepts methods and tools in Kansei Engineering. Theoretical Issues in Ergonomics Science, 5(3), 214-231.Google Scholar
  23. 23.
    Seppo P., Mikko S. & Mahmood A. (2007). Employee’s behaviour towards IS security policy compliance.Google Scholar
  24. 24.
    Son J. Y. (2011). Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies, Information & Measures. 48(7), 296-302.Google Scholar
  25. 25.
    Stanton J.M., Stam K. R., Mastrangelo P. & Jlton J. (2015). Analysis of end user security behaviours. Computers and Security, 24(2), 124-133.Google Scholar
  26. 26.
    Tharangie K. G. D., Irfan C. M. A., Marasinghe C. A. & Yamada K. (2008). Kansei Engineering Assessing Systems to Enhance the Usability in e-learning web interfaces: Colour basis. In 16th International Conference on Computers in Education, 1(1), pp. 145-150.Google Scholar
  27. 27.
    Vance A., Eargle D., Ouimet K. & Straub D. (2013). Enhancing password security through interactive fear appeals: A web-based field experiment. In System Sciences (HICSS), 2013 46th Hawaii International Conference on, pp. 2988-2997.IEEE.Google Scholar
  28. 28.
    Vance A., Siponen M., & Pahnilia S. (2012). Motivating IS security compliance: insight from habit and protection motivation theory. Information & Measures, 49(3), 190-198.Google Scholar
  29. 29.
    Wang P. A. (2010). Information security knowledge and behaviour: An adapted model of technology acceptance. In Education Technology and Computer (ICETC), 2010 2nd International Conference on (Vol. 2, pp. V2-3264). IEEE.Google Scholar
  30. 30.
    Witte K. (1992). Putting the fear back into fear appeals: The extended parallel process model, Communication Monographs, 59(4), 329-349.Google Scholar
  31. 31.
    Xu H., Rossan M. B., & Carroll J. M. (2007). Increasing the persuasiveness of IT security communication: Effects of fear appeals and self-view. In Workshop on Usable IT security.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Nurjannatul Jannah Aqilah Md Saad
    • 1
  • Mat Razali Noor Afiza
    • 1
  • Khairul Khalil Ishak
    • 2
  • Nor Asiakin Hasbullah
    • 1
  • Norulzahrah Mohd Zainudin
    • 1
  • Suzaimah Ramli
    • 1
  • Norshahriah Wahab
    • 1
  • Mohd Fahmi Mohamad Amran
    • 1
  1. 1.National Defence University of MalaysiaKuala LumpurMalaysia
  2. 2.Tokyo University of TechnologyTokyoJapan

Personalised recommendations