Developing a Mental Model for use in the Context of Computer Security

被引:2
|
作者
Liljestrand, Isaiah [1 ]
Gonzales, Marcelo [2 ]
Shin, Dongwan [1 ]
机构
[1] New Mexico Inst Min & Technol, Comp Sci & Engn, Socorro, NM 87801 USA
[2] Colorado Sch Mines, Comp Sci, Golden, CO 80401 USA
基金
美国国家科学基金会;
关键词
Computer security; Usability; Mental Model; Influence; FEAR APPEALS;
D O I
10.1145/3297280.3299748
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A mental model is a useful tool for describing user's general mental processes that go into certain actions. In this paper, we investigate how to enhance the usability of security applications by considering human factors. Specifically, we study how to better understand and develop the user's mental model in the context of computer security through the use of the reasoned action approach (RAA). RAA explains that a user's behavior is determined by her intention to perform the behavior and the intention is, in turn, a function of attitudes towards the behavior, perceived norms (or social pressure), and perceived behavior control (capacity and relevant skills/abilities). A user study was conducted to test the validity of each of the main components of the model. Our user study concluded that alterations to a computer security application improved by the analysis through the mental model created improved user behavior.
引用
收藏
页码:2336 / 2339
页数:4
相关论文
共 50 条
  • [41] The information infrastructures of 1985 and 2018: The sociotechnical context of computer law & security
    Clarke, Roger
    Wigan, Marcus
    COMPUTER LAW & SECURITY REVIEW, 2018, 34 (04) : 677 - 700
  • [42] Use of security domains in context-aware networks
    Herwono, Ian
    Giaffreda, Raffaele
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 2878 - 2882
  • [43] Security Context Migration in MEC: Challenges and Use Cases
    Niewolski, Wojciech
    Nowak, Tomasz W.
    Sepczuk, Mariusz
    Kotulski, Zbigniew
    Artych, Rafal
    Bocianiak, Krzysztof
    Wary, Jean-Philippe
    ELECTRONICS, 2022, 11 (21)
  • [44] Energy Security in the context of Peaceful Use of Nuclear Energy
    Terem, Peter
    Husenicova, Lucia
    Suplata, Milan
    POLITICKE VEDY, 2011, 14 (01): : 50 - 73
  • [45] Developing a Broadband Adoption Model in the UK Context
    Dwivedi, Yogesh K.
    Mustafee, Navonil
    Williams, Michael D.
    Lal, Banita
    HUMAN BENEFIT THROUGH THE DIFFUSION OF INFORMATION SYSTEMS DESIGN SCIENCE RESEARCH, 2010, 318 : 192 - +
  • [46] Developing a distributed agent-based computer network security infrastructure
    Hu, J.
    Tsoi, W. Y.
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 2243 - +
  • [47] Factors Influencing College Students' Use of Computer Security
    Pendegraft, Norman
    Rounds, Mark
    Stone, Robert W.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (03) : 51 - 60
  • [48] Disambiguating a Mental Model: Influence of Social Context
    Ulrich von Hecker
    The Psychological Record, 2004, 54 : 27 - 43
  • [49] Disambiguating a mental model: Influence of social context
    Von Hecker, U
    PSYCHOLOGICAL RECORD, 2004, 54 (01): : 27 - 43
  • [50] Developing the 'youth model' in mental health services
    Birleson, Peter
    Vance, Alasdair
    AUSTRALASIAN PSYCHIATRY, 2008, 16 (01) : 22 - 26