Symbolism in Computer Security Warnings: Signal Icons & Signal Words

Security warning is often encountered by the end users when they use their system. It is a form of communication to notify the users of possible consequences in the future. These threats have always been evolved with the advancement of technologies. The attacks threaten the end users with many harmful effects such as malware attacks. However, security warning keeps being ignored due to various reasons. One of the reasons is lack of attention towards warnings. The end users feels burden and treat security task as a secondary rather than primary task. To divert user’s mind to read and comprehend the security warnings, it is important to capture the user’s attention. Signal words and signal icons are important in the security warning as it is the elements that could help user to heed the warnings. A survey study has been conducted with 60 participants in regards to the perception towards attractiveness and understanding of the signal words and icons. It can be revealed that end users significantly feel that the icon with the exclamation marks is attractive and easy to understand. However, only one of three hypotheses is proven to be significant.

[1]  Cristian Bravo-Lillo Improving Computer Security Dialogs: An Exploration of Attention and Habituation , 2014 .

[2]  Zarul Fitri Zaaba,et al.  A study on improving security warnings , 2014, The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M).

[3]  Zarul Fitri Zaaba,et al.  Examination on Usability Issues of Security Warning Dialogs , 2015 .

[4]  Ingoo Han,et al.  Security threats to Internet: a Korean multi-industry investigation , 2001, Inf. Manag..

[5]  Steven Hsu,et al.  A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings , 2011, SOUPS.

[6]  Kat Krol,et al.  Don't work. Can't work? Why it's time to rethink security warnings , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).

[7]  Steven Furnell,et al.  Considering the Usability of End-User Security Software , 2006, SEC.

[8]  Evie McCrum-Gardner,et al.  Which is the correct statistical test to use? , 2008, The British journal of oral & maxillofacial surgery.

[9]  Lorrie Faith Cranor,et al.  You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.

[10]  Kori Inkpen Quinn,et al.  Gathering evidence: use of visual security cues in web browsers , 2005, Graphics Interface.

[11]  Wendy A. Rogers,et al.  Warning Research: An Integrative Perspective , 2000, Hum. Factors.

[12]  Pam J. Mayhew,et al.  Users' Awareness of Visible Security Design Flaws , 2016 .

[13]  Leah Zhang-Kennedy Improving Mental Models of Computer Security Through Information Graphics , 2013 .

[14]  Jo-Mae B. Maris,et al.  Signal Words and Signal Icons in Application Control and Information Technology Exception Messages - Hazard Matching and Habituation Effects , 2006, J. Inf. Syst..

[15]  Robert Biddle,et al.  Auction Hero: The Design of a Game to Learn and Teach about Computer Security , 2011 .

[16]  Lorrie Faith Cranor,et al.  Improving Computer Security Dialogs , 2011, INTERACT.

[17]  Dimitris Gritzalis,et al.  Security Busters: Web browser security vs. rogue sites , 2015, Comput. Secur..