2020
DOI: 10.1080/0144929x.2020.1734087
|View full text |Cite
|
Sign up to set email alerts
|

Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security

Abstract: Anti-malware software must be frequently updated in order to protect the system and the user from attack. Makers of this software must choose between interrupting the user to update immediately or allowing them to update later. In either case, assessing the content of the interruption may still require cognitive investment. However, by allowing the user to negotiate a delayed response to these interruptions, users can instead focus on their work. This paper experimentally examines the effect of immediate and n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 124 publications
0
7
0
Order By: Relevance
“…However, it is not a good idea to interrupt people's tasks and thought processes too brusquely, as this can degrade users' decision-making efficiency and accuracy (Tan et al, 2020), nor is it desirable to scare internet users too much, since perceived risk has proven to be associated with people refraining from performing specific internet activities (e.g., online shopping). This results in individuals missing out on opportunities the internet has to offer, which translates into a considerable opportunity cost to society in general (Riek et al, 2014).…”
Section: Discussionmentioning
confidence: 99%
“…However, it is not a good idea to interrupt people's tasks and thought processes too brusquely, as this can degrade users' decision-making efficiency and accuracy (Tan et al, 2020), nor is it desirable to scare internet users too much, since perceived risk has proven to be associated with people refraining from performing specific internet activities (e.g., online shopping). This results in individuals missing out on opportunities the internet has to offer, which translates into a considerable opportunity cost to society in general (Riek et al, 2014).…”
Section: Discussionmentioning
confidence: 99%
“…Works [8], [13], [20] discussed the lifespan of malware and analyzed the attacks. Works [3], [4], [5], [11], [12], [13] pro-posed the method to send security notifications to infected users to evoke further activities for countermeasures against the malware, such as turning the power of the infected devices off, closing the open ports, or removing the malware by anti-virus tools. Work [10] sent security notifications to industrial control systems to avoid damage.…”
Section: Related Workmentioning
confidence: 99%
“…As an increasing number of devices are connected to the Internet, cyberattacks targeting them become critical issues. IoT botnets, such as Mirai and its variants, conduct impactful DDoS attacks damaging network operators by consuming their network resources [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [14], [15], [21].…”
Section: Introduction 11 Background and Purposementioning
confidence: 99%
“…As a result, it suggests a possible influence on electronic word of mouth. Companies expose users to online behavioral advertisements (OBA) based on their interests, past online history and behaviors in order to customize the services offered to online users (Tan et al, 2021). Besides, one of the most crucial types of personalization for online users is high level of content personalization because it aids in the completion of their online tasks (Bleier and Eisenbeiss, 2015).…”
Section: Introductionmentioning
confidence: 99%