Effects of security warnings and instant gratification cues on attitudes toward mobile websites

In order to address the increased privacy and security concerns raised by mobile communications, designers of mobile applications and websites have come up with a variety of warnings and appeals. While some interstitials warn about potential risk to personal information due to an untrusted security certificate, others attempt to take users' minds away from privacy concerns by making tempting, time-sensitive offers. How effective are they? We conducted an online experiment (N = 220) to find out. Our data show that both these strategies raise red flags for users - appeals to instant gratification make users more leery of the site and warnings make them perceive greater threat to personal data. Yet, users tend to reveal more information about their social media accounts when warned about an insecure site. This is probably because users process these interstitials based on cognitive heuristics triggered by them. These findings hold important implications for the design of cues in mobile interfaces.

[1]  Miriam J. Metzger,et al.  Digital Media, Youth, and Credibility , 2007 .

[2]  Miriam J. Metzger Effects of Site, Vendor, and Consumer Characteristics on Web Site Trust and Disclosure , 2006, Commun. Res..

[3]  Maro Vlachopoulou,et al.  Modeling users’ acceptance of mobile services , 2012, Electronic Commerce Research.

[4]  S. Sundar The MAIN Model : A Heuristic Approach to Understanding Technology Effects on Credibility , 2007 .

[5]  Gregory D. Abowd,et al.  Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service , 2005, UbiComp.

[6]  Jolanda Veldhuis,et al.  Who are these power users anyway? Building a psychological profile , 2007 .

[7]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[8]  Thomas L. Meade I want it now: Do new media affect ability to delay gratification? , 2012 .

[9]  James Price Dillard,et al.  The Persuasion Handbook: Developments in Theory and Practice , 2002 .

[10]  Jonathan Marshall,et al.  Interactive Technology and Persuasion , 2002 .

[11]  Mary Beth Rosson,et al.  The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing , 2011, Decis. Support Syst..

[12]  Thomas E. Ruggiero Uses and Gratifications Theory in the 21st Century , 2000 .

[13]  Saraswathi Bellur,et al.  How Can We Tell When a Heuristic Has Been Used? Design and Analysis Strategies for Capturing the Operation of Heuristics , 2014 .

[14]  Bo Zhang,et al.  Unlocking the privacy paradox: do cognitive heuristics hold the key? , 2013, CHI Extended Abstracts.

[15]  S. Shyam Sundar,et al.  The Psychological Appeal of Personalized Content in Web Portals: Does Customization Affect Attitudes and Behavior? , 2006 .

[16]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .