Developing a Mental Model for use in the Context of Computer Security

被引:2
|
作者
Liljestrand, Isaiah [1 ]
Gonzales, Marcelo [2 ]
Shin, Dongwan [1 ]
机构
[1] New Mexico Inst Min & Technol, Comp Sci & Engn, Socorro, NM 87801 USA
[2] Colorado Sch Mines, Comp Sci, Golden, CO 80401 USA
基金
美国国家科学基金会;
关键词
Computer security; Usability; Mental Model; Influence; FEAR APPEALS;
D O I
10.1145/3297280.3299748
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A mental model is a useful tool for describing user's general mental processes that go into certain actions. In this paper, we investigate how to enhance the usability of security applications by considering human factors. Specifically, we study how to better understand and develop the user's mental model in the context of computer security through the use of the reasoned action approach (RAA). RAA explains that a user's behavior is determined by her intention to perform the behavior and the intention is, in turn, a function of attitudes towards the behavior, perceived norms (or social pressure), and perceived behavior control (capacity and relevant skills/abilities). A user study was conducted to test the validity of each of the main components of the model. Our user study concluded that alterations to a computer security application improved by the analysis through the mental model created improved user behavior.
引用
收藏
页码:2336 / 2339
页数:4
相关论文
共 50 条
  • [21] The use of hardware virtualization in the context of information security
    D. V. Silakov
    Programming and Computer Software, 2012, 38 : 276 - 280
  • [22] Developing measures of food and nutrition security within an Australian context
    Archer, Claire
    Gallegos, Danielle
    McKechnie, Rebecca
    PUBLIC HEALTH NUTRITION, 2017, 20 (14) : 2513 - 2522
  • [23] Higher IT security through context computer: Plea for a paradigm shift
    Höhere IT-sicherheit durch context computer: Plädoyer für einen paradigmenwechsel
    Burkhardt, H.-J. (heinzjuergen.burkhardt@t-online.de), 1600, Springer Verlag (35):
  • [24] Context for the SA NREN Computer Security Incident Response Team
    Mooi, Roderick
    Botha, Reinhardt A.
    2016 IST-AFRICA WEEK CONFERENCE, 2016,
  • [25] Developing a model of recovery in mental health
    Noiseux, Sylvie
    Tribble, Denise St-Cyr
    Leclerc, Claude
    Ricard, Nicole
    Corin, Ellen
    Morissette, Raymond
    Lambert, Roseline
    BMC HEALTH SERVICES RESEARCH, 2009, 9
  • [26] Developing a model of recovery in mental health
    Sylvie Noiseux
    Denise St-Cyr Tribble
    Claude Leclerc
    Nicole Ricard
    Ellen Corin
    Raymond Morissette
    Roseline Lambert
    BMC Health Services Research, 9
  • [27] Computer use-innovativeness: cognition and context
    Foxall, GR
    Bhate, S
    INTERNATIONAL JOURNAL OF TECHNOLOGY MANAGEMENT, 1999, 17 (1-2) : 157 - 172
  • [28] Mental Representation and Change: Developing Attachment Relationships in an Adoption Context
    Steele, Miriam
    Hodges, Jill
    Kaniuk, Jeanne
    Steele, Howard
    PSYCHOANALYTIC INQUIRY, 2010, 30 (01) : 25 - 40
  • [29] Context Aware Adaptive Security Service Model
    Tunia, Marcin A.
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2015, 2015, 9662
  • [30] Alcohol use and mental health in developing countries
    Patel, Vikram
    ANNALS OF EPIDEMIOLOGY, 2007, 17 (05) : S87 - S92