IEEE Technology and Society Magazine - Spring 2013 - 77

make the risk more easily accessible and thus available to the
end user. This might discourage
users from sharing information on
Facebook. Information sharing on
Facebook is further impinged by
availability. In general Facebook,
or any site that wants the user to
share their information, advertises
the benefits of information sharing. Thus, even though the users
may be aware of the risks, they
only pay attention to the benefits
as those are more salient. Further,
risk communication may cause the
user to reflect on why they chose
to share the information and thus
make it appear more beneficial that
it truly is, i.e., belief perseverance.
However, this can be alleviated by
asking the users to generate a counter hypothesis and explanation [28].
Thus, end users should be asked to
generate the benefits of sharing less
information or the risks of sharing
more information. This hypothesis
generation and explanation would
make the risks of information sharing more salient.
Affect
The affect heuristic refers to the
general feeling that a person may
have towards a certain action. It differs from the previously described
heuristics in not being cognitive;
rather affect deals with emotions
[27]. For example, a person may
choose to buy one car over another
not based on performance or price,
but purely because they find it more
attractive. Another example is the
difference in increased happiness
or sadness when a person wins or
loses. Consider a choice between
winning $50 or losing $50. Since
the expected value of the gain or
loss is the same, the increase in
happiness with gain should be
equivalent to any increase in sadness with loss. However, the affect
heuristic causes a person to be
more wary of losses than accepting
of gains. Thus, winning $50 is less
joyful than losing the same amount
is painful.

Schwarz noted that people
might attribute current affective
states to an evaluation irrespective of valence [20]. Thus, people
may rate their overall satisfaction
with their lives higher on sunny
days as compared to rainy days.
This effect can be alleviated
by making the source of affect
explicit, e.g., they can be asked
about local weather earlier. In general, good moods may lead to positive evaluation, while bad moods
may lead to negative evaluation.
Affect can impinge availability
and vice versa, e.g., perceived risk
was greater when participants were
presented with risk information for
30 years as compared to one year
[12]. Thus, it may be better to provide aggregate financial loss due
to phishing for several years than
just one.
positive affect impinges cognitive flexibility [9]. In general, better
moods increase a person's ability to
retrieve, store, and process information. Thus, designers of security
risk communication should ensure
that it does not create undue anxiety
or negative affect in the recipient.
This can be critical for older adults
who have lower cognitive plasticity
than younger adults and who also
have lower technical literacy. This
reflects the previous discussion of
loss and gain framing.

Implications
for System Design
The heuristics and biases have
been described in general terms.
Here we make specific suggestions for presentation of security
technologies.
Technologies that prevent
harm should be framed as gain,
while those that detect risk should
be framed as loss. Thus, patching
should be framed as better software, while lack of antivirus software should be framed as slower
systems. Simultaneously, users
should be primed with stereotypes or exemplars, contingent on
whether assimilation or contrast

IEEE TECHNOLOGY AND SOCIETY MAGAZINE

|

SprING 2013

mitigates risk. Thus, security
risk communication should use
stereotypes when encouraging
patching, not extreme cases or
exemplars. However, when discouraging suspicious downloads
(perhaps an extreme example
of someone downloading what
is in high probability malware)
extreme cases would be more
appropriate.
In terms of assimilation and
contrast, the current communications do not differentiate between
extremely common low-risk action
and rare high-risk action. That
assimilation is the result is not
surprising. All risks are similarly
framed in terms of UI, text, and
simplified imagery. The fact that
implementing contrasting behaviors is difficult (for example, selective script disabling) exacerbates
this problem.
representativeness can be leveraged by grounding risk communication in existing mental models
that have been found to be successful at changing behaviors in
other domains, e.g., health risks.
risk communication should then
begin by showing non-experts that
they have rejected similar risks
offline. Arguably most individuals would not consider providing their SSN and bank account
numbers to a stranger at their
door, they should similarly reject
phishing [39]. Security warnings
could be, like advertising, targeted according to the user's mental model, which can be estimated
from information available on the
client [40].
Leveraging the availability heuristic implies emphasizing the likeliness of an event. Like crossing
the street, individuals online open
web sites every day. Warnings on
every website about possible risk
will decrease availability, as many
potentially risky situations are correlated with no harm. In contrast,
information about aggregate risk
not specific technical information
may be more effective.
|

77



Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - Spring 2013

IEEE Technology and Society Magazine - Spring 2013 - Cover1
IEEE Technology and Society Magazine - Spring 2013 - Cover2
IEEE Technology and Society Magazine - Spring 2013 - 1
IEEE Technology and Society Magazine - Spring 2013 - 2
IEEE Technology and Society Magazine - Spring 2013 - 3
IEEE Technology and Society Magazine - Spring 2013 - 4
IEEE Technology and Society Magazine - Spring 2013 - 5
IEEE Technology and Society Magazine - Spring 2013 - 6
IEEE Technology and Society Magazine - Spring 2013 - 7
IEEE Technology and Society Magazine - Spring 2013 - 8
IEEE Technology and Society Magazine - Spring 2013 - 9
IEEE Technology and Society Magazine - Spring 2013 - 10
IEEE Technology and Society Magazine - Spring 2013 - 11
IEEE Technology and Society Magazine - Spring 2013 - 12
IEEE Technology and Society Magazine - Spring 2013 - 13
IEEE Technology and Society Magazine - Spring 2013 - 14
IEEE Technology and Society Magazine - Spring 2013 - 15
IEEE Technology and Society Magazine - Spring 2013 - 16
IEEE Technology and Society Magazine - Spring 2013 - 17
IEEE Technology and Society Magazine - Spring 2013 - 18
IEEE Technology and Society Magazine - Spring 2013 - 19
IEEE Technology and Society Magazine - Spring 2013 - 20
IEEE Technology and Society Magazine - Spring 2013 - 21
IEEE Technology and Society Magazine - Spring 2013 - 22
IEEE Technology and Society Magazine - Spring 2013 - 23
IEEE Technology and Society Magazine - Spring 2013 - 24
IEEE Technology and Society Magazine - Spring 2013 - 25
IEEE Technology and Society Magazine - Spring 2013 - 26
IEEE Technology and Society Magazine - Spring 2013 - 27
IEEE Technology and Society Magazine - Spring 2013 - 28
IEEE Technology and Society Magazine - Spring 2013 - 29
IEEE Technology and Society Magazine - Spring 2013 - 30
IEEE Technology and Society Magazine - Spring 2013 - 31
IEEE Technology and Society Magazine - Spring 2013 - 32
IEEE Technology and Society Magazine - Spring 2013 - 33
IEEE Technology and Society Magazine - Spring 2013 - 34
IEEE Technology and Society Magazine - Spring 2013 - 35
IEEE Technology and Society Magazine - Spring 2013 - 36
IEEE Technology and Society Magazine - Spring 2013 - 37
IEEE Technology and Society Magazine - Spring 2013 - 38
IEEE Technology and Society Magazine - Spring 2013 - 39
IEEE Technology and Society Magazine - Spring 2013 - 40
IEEE Technology and Society Magazine - Spring 2013 - 41
IEEE Technology and Society Magazine - Spring 2013 - 42
IEEE Technology and Society Magazine - Spring 2013 - 43
IEEE Technology and Society Magazine - Spring 2013 - 44
IEEE Technology and Society Magazine - Spring 2013 - 45
IEEE Technology and Society Magazine - Spring 2013 - 46
IEEE Technology and Society Magazine - Spring 2013 - 47
IEEE Technology and Society Magazine - Spring 2013 - 48
IEEE Technology and Society Magazine - Spring 2013 - 49
IEEE Technology and Society Magazine - Spring 2013 - 50
IEEE Technology and Society Magazine - Spring 2013 - 51
IEEE Technology and Society Magazine - Spring 2013 - 52
IEEE Technology and Society Magazine - Spring 2013 - 53
IEEE Technology and Society Magazine - Spring 2013 - 54
IEEE Technology and Society Magazine - Spring 2013 - 55
IEEE Technology and Society Magazine - Spring 2013 - 56
IEEE Technology and Society Magazine - Spring 2013 - 57
IEEE Technology and Society Magazine - Spring 2013 - 58
IEEE Technology and Society Magazine - Spring 2013 - 59
IEEE Technology and Society Magazine - Spring 2013 - 60
IEEE Technology and Society Magazine - Spring 2013 - 61
IEEE Technology and Society Magazine - Spring 2013 - 62
IEEE Technology and Society Magazine - Spring 2013 - 63
IEEE Technology and Society Magazine - Spring 2013 - 64
IEEE Technology and Society Magazine - Spring 2013 - 65
IEEE Technology and Society Magazine - Spring 2013 - 66
IEEE Technology and Society Magazine - Spring 2013 - 67
IEEE Technology and Society Magazine - Spring 2013 - 68
IEEE Technology and Society Magazine - Spring 2013 - 69
IEEE Technology and Society Magazine - Spring 2013 - 70
IEEE Technology and Society Magazine - Spring 2013 - 71
IEEE Technology and Society Magazine - Spring 2013 - 72
IEEE Technology and Society Magazine - Spring 2013 - 73
IEEE Technology and Society Magazine - Spring 2013 - 74
IEEE Technology and Society Magazine - Spring 2013 - 75
IEEE Technology and Society Magazine - Spring 2013 - 76
IEEE Technology and Society Magazine - Spring 2013 - 77
IEEE Technology and Society Magazine - Spring 2013 - 78
IEEE Technology and Society Magazine - Spring 2013 - 79
IEEE Technology and Society Magazine - Spring 2013 - 80
IEEE Technology and Society Magazine - Spring 2013 - Cover3
IEEE Technology and Society Magazine - Spring 2013 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com