TY - JOUR
T1 - How do non experts think about cyber attack consequences?
AU - Jones, Keith S.
AU - Lodinger, Natalie R.
AU - Widlus, Benjamin P.
AU - Siami Namin, Akbar
AU - Maw, Emily
AU - Armstrong, Miriam E.
N1 - Funding Information:
This research was supported in part by the U.S. National Science Foundation (Award : 1564293). Opinions, findings, and conclusions are those of the authors and do not necessarily reflect the views of the NSF.
Publisher Copyright:
© 2022, Emerald Publishing Limited.
PY - 2022
Y1 - 2022
N2 - Purpose: Nonexperts do not always follow the advice in cybersecurity warning messages. To increase compliance, it is recommended that warning messages use nontechnical language, describe how the cyberattack will affect the user personally and do so in a way that aligns with how the user thinks about cyberattacks. Implementing those recommendations requires an understanding of how nonexperts think about cyberattack consequences. Unfortunately, research has yet to reveal nonexperts’ thinking about cyberattack consequences. Toward that end, the purpose of this study was to examine how nonexperts think about cyberattack consequences. Design/methodology/approach: Nonexperts sorted cyberattack consequences based on perceived similarity and labeled each group based on the reason those grouped consequences were perceived to be similar. Participants’ labels were analyzed to understand the general themes and the specific features that are present in nonexperts’ thinking. Findings: The results suggested participants mainly thought about cyberattack consequences in terms of what the attacker is doing and what will be affected. Further, the results suggested participants thought about certain aspects of the consequences in concrete terms and other aspects of the consequences in general terms. Originality/value: This research illuminates how nonexperts think about cyberattack consequences. This paper also reveals what aspects of nonexperts’ thinking are more or less concrete and identifies specific terminology that can be used to describe aspects that fall into each case. Such information allows one to align warning messages to nonexperts’ thinking in more nuanced ways than would otherwise be possible.
AB - Purpose: Nonexperts do not always follow the advice in cybersecurity warning messages. To increase compliance, it is recommended that warning messages use nontechnical language, describe how the cyberattack will affect the user personally and do so in a way that aligns with how the user thinks about cyberattacks. Implementing those recommendations requires an understanding of how nonexperts think about cyberattack consequences. Unfortunately, research has yet to reveal nonexperts’ thinking about cyberattack consequences. Toward that end, the purpose of this study was to examine how nonexperts think about cyberattack consequences. Design/methodology/approach: Nonexperts sorted cyberattack consequences based on perceived similarity and labeled each group based on the reason those grouped consequences were perceived to be similar. Participants’ labels were analyzed to understand the general themes and the specific features that are present in nonexperts’ thinking. Findings: The results suggested participants mainly thought about cyberattack consequences in terms of what the attacker is doing and what will be affected. Further, the results suggested participants thought about certain aspects of the consequences in concrete terms and other aspects of the consequences in general terms. Originality/value: This research illuminates how nonexperts think about cyberattack consequences. This paper also reveals what aspects of nonexperts’ thinking are more or less concrete and identifies specific terminology that can be used to describe aspects that fall into each case. Such information allows one to align warning messages to nonexperts’ thinking in more nuanced ways than would otherwise be possible.
KW - Cyberattack consequences
KW - Cybersecurity
KW - Mental models
KW - Warning message design
UR - http://www.scopus.com/inward/record.url?scp=85128020873&partnerID=8YFLogxK
U2 - 10.1108/ICS-11-2020-0184
DO - 10.1108/ICS-11-2020-0184
M3 - Article
AN - SCOPUS:85128020873
JO - Information and Computer Security
JF - Information and Computer Security
SN - 2056-4961
ER -