TU Darmstadt / ULB / TUbiblio

Click me if you can! - How do users decide whether to follow a call to action in an online message?

Pfeiffer, Thomas and Theuerling, Heike and Kauer, Michaela :
Click me if you can! - How do users decide whether to follow a call to action in an online message?
[Online-Edition: http://link.springer.com/chapter/10.1007/978-3-642-39345-7_1...]
In: Human Aspects of Information Security, Privacy, and Trust, 27 - 26 Jul 2013, Las Vegas, NV. In: Lecture Notes in Computer Science , 8030 . Berlin Heidelberg
[Conference or Workshop Item] , (2013)

Official URL: http://link.springer.com/chapter/10.1007/978-3-642-39345-7_1...

Abstract

Being able to predict how internet users react when confronted with a potentially dangerous call for action in an online message (such as an e-mail) is important for severalreasons. On the one hand, users have to be protected from fraudulent e-mails such as phishing. On the other hand, over-cautious users would be difficult to communicate with on the internet, so senders of legitimate messages have to know how to convince recipients of the authenticity of their messages. Extensive research already exists from both of these perspectives, but each study only explores certain aspects of the complex system of factors influencing users’ reactions. In this paper the results of our efforts to integrate the various existing findings into one comprehensive model are presented, along with the results of a preliminary qualitative evaluation of some of the model’s predictions using quantitative as well as qualitative measures and eye-tracking.

Item Type: Conference or Workshop Item
Erschienen: 2013
Creators: Pfeiffer, Thomas and Theuerling, Heike and Kauer, Michaela
Title: Click me if you can! - How do users decide whether to follow a call to action in an online message?
Language: English
Abstract:

Being able to predict how internet users react when confronted with a potentially dangerous call for action in an online message (such as an e-mail) is important for severalreasons. On the one hand, users have to be protected from fraudulent e-mails such as phishing. On the other hand, over-cautious users would be difficult to communicate with on the internet, so senders of legitimate messages have to know how to convince recipients of the authenticity of their messages. Extensive research already exists from both of these perspectives, but each study only explores certain aspects of the complex system of factors influencing users’ reactions. In this paper the results of our efforts to integrate the various existing findings into one comprehensive model are presented, along with the results of a preliminary qualitative evaluation of some of the model’s predictions using quantitative as well as qualitative measures and eye-tracking.

Title of Book: Human Aspects of Information Security, Privacy, and Trust
Series Name: Lecture Notes in Computer Science
Volume: 8030
Place of Publication: Berlin Heidelberg
Uncontrolled Keywords: decision model, e-mail, phishing, social engineering, e-commerce, trust, risk
Divisions: 16 Department of Mechanical Engineering
16 Department of Mechanical Engineering > Ergonomics (IAD)
03 Department Human Sciences
03 Department Human Sciences > Institute for Psychology
Event Title: Human Aspects of Information Security, Privacy, and Trust
Event Location: Las Vegas, NV
Event Dates: 27 - 26 Jul 2013
Date Deposited: 25 Aug 2013 19:55
Official URL: http://link.springer.com/chapter/10.1007/978-3-642-39345-7_1...
URN: urn:nbn:de:tuda-tuprints-35839
Identification Number: IADN: 1946
Export:

Optionen (nur für Redakteure)

View Item View Item