skip to main content
10.1145/3532105.3535013acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

"Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA

Authors Info & Claims
Published:08 June 2022Publication History

ABSTRACT

The voluntary adoption rate of two-factor authentication (2FA) remains low. This paper investigates whether video-based risk communication messages about Duo 2FA impacts voluntary 2FA adoption rate when delivered by a human speaker versus a cartoon speaker. We conducted an online two-phased survey-based study with 435 university students comprised of those who have not enabled Duo 2FA (non-adopters) on their university account as well as those who had previously enabled Duo 2FA (adopters). Participants in the non-adopters group (139) were assigned to one of the three groups: Threat-R (human speaker video), Threat-A (cartoon speaker video), and Control (no video). We found that 31% of participants enabled Duo 2FA through the human speaker video message compared to 7% with the cartoon speaker video message. However, there was no significant difference between the treatment and control groups (17% of participants enabled Duo 2FA in the Control group). Nevertheless, the treatment group participants showed their intention to activate Duo 2FA on their university account in the future. Those who enabled Duo 2FA rated Duo's usability as good. Moreover, enabling Duo 2FA on university accounts led some participants to enable 2FA on other online accounts. Our findings suggest that risk communication through videos that have a human speaker could increase users' willingness to adopt security features.

Skip Supplemental Material Section

Supplemental Material

sacmat02-al-qahtani.mp4

mp4

16.7 MB

References

  1. Jemal Abawajy. 2014. User preference of cyber security awareness delivery methods. Behaviour & Information Technology 33, 3 (2014), 237--248.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Preston Ackerman. 2014. Impediments to adoption of two-factor authentication by home end-users. SANS Institute InfoSec Reading Room (2014).Google ScholarGoogle Scholar
  3. Elham Al Qahtani, Lipsarani Sahoo, and Mohamed Shehab. 2021. The Effectiveness of Video Messaging Campaigns to Use 2FA. In International Conference on Human-Computer Interaction. Springer, 369--390.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Elham Al Qahtani, Mohamed Shehab, and Abrar Aljohani. 2018. The effectiveness of fear appeals in increasing smartphone locking behavior among Saudi Arabians. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 31--46.Google ScholarGoogle Scholar
  5. Yusuf Albayram, Mohammad Maifi Hasan Khan, and Michael Fagan. 2017. A study on designing video tutorials for promoting security features: A case study in the context of two-factor authentication (2fa). International Journal of Human--Computer Interaction 33, 11 (2017), 927--942.Google ScholarGoogle ScholarCross RefCross Ref
  6. Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, and Nhan Nguyen. 2017. ?... better to use a lock screen than to worry about saving a few seconds of time": Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). 49--63.Google ScholarGoogle Scholar
  7. Maha Althobaiti and Pam Mayhew. 2014. Security and usability of authenticating process of online banking: User experience study. Proceedings - International Carnahan Conference on Security Technology 2014, 1--6. https://doi.org/10.1109/CCST.2014.6986978Google ScholarGoogle ScholarCross RefCross Ref
  8. Catherine L Anderson and Ritu Agarwal. 2010. Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS quarterly 34, 3 (2010), 613--643.Google ScholarGoogle Scholar
  9. Maria Bada, Angela M Sasse, and Jason RC Nurse. 2019. Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 (2019).Google ScholarGoogle Scholar
  10. Reuben M Baron and David A Kenny. 1986. The moderator--mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of personality and social psychology 51, 6 (1986), 1173.Google ScholarGoogle ScholarCross RefCross Ref
  11. Scott R Boss, Dennis F Galletta, Paul Benjamin Lowry, Gregory D Moody, and Peter Polak. 2015. What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS quarterly 39, 4 (2015), 837--864.Google ScholarGoogle Scholar
  12. Jessica Colnago, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Lorrie Cranor, and Nicolas Christin. 2018. "It's not actually that horrible" Exploring Adoption of Two-Factor Authentication at a University. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Sanchari Das, Andrew Dingman, and L Jean Camp. 2018. Why Johnny doesn't use two factor a two-phase usability study of the FIDO U2F security key. In International Conference on Financial Cryptography and Data Security. Springer, 160--179.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sanchari Das, Gianpaolo Russo, Andrew Dingman, Jayati Dev, Olivia Kenny, and L. Camp. 2017. A Qualitative Study on Usability and Acceptability of Yubico Security Key. (12 2017).Google ScholarGoogle Scholar
  15. Björn B De Koning, Huib K Tabbers, Remy MJP Rikers, and Fred Paas. 2007. Attention cueing as a means to enhance learning from an animation. Applied Cognitive Psychology: The Official Journal of the Society for Applied Research in Memory and Cognition 21, 6 (2007), 731--746.Google ScholarGoogle ScholarCross RefCross Ref
  16. Duo. 2021. Multi-Factor Authentication from Duo. Retrieved June, 2021 from https://duo.com/product/multi-factor-authentication-mfa.Google ScholarGoogle Scholar
  17. Jonathan Dutson, Danny Allen, Dennis Eggett, and Kent Seamons. 2019. Don't Punish all of us: Measuring User Attitudes about Two-Factor Authentication. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 119--128.Google ScholarGoogle ScholarCross RefCross Ref
  18. Cori Faklaris, Laura A. Dabbish, and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 61--77.Google ScholarGoogle Scholar
  19. Bartlomiej Hanus and Yu "Andy" Wu. 2016. Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective. Information Systems Management 33, 1 (2016), 2--16.Google ScholarGoogle Scholar
  20. Marian Harbach, Markus Hettig, Susanne Weber, and Matthew Smith. 2014. Using personal examples to improve risk communication for security & privacy decisions. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 2647--2656.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Jurjen Jansen and Paul van Schaik. 2019. The design and evaluation of a theory-based intervention to promote security behaviour against phishing. International Journal of Human-Computer Studies 123 (2019), 40--55.Google ScholarGoogle ScholarCross RefCross Ref
  22. Yousra Javed and Mohamed Shehab. 2016. Investigating the animation of application permission dialogs: a case study of Facebook. In Data Privacy Management and Security Assurance. Springer, 146--162.Google ScholarGoogle Scholar
  23. Jeffrey L Jenkins, Mark Grimes, Jeffrey Gainer Proudfoot, and Paul Benjamin Lowry. 2014. Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time fear appeals. Information Technology for Development 20, 2 (2014), 196--213.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. WA Labuschagne, I Burke, Namosha Veerasamy, and MM Eloff. 2011. Design of cyber security awareness game utilizing a social media framework. In 2011 Information Security for South Africa. IEEE, 1--9.Google ScholarGoogle Scholar
  25. Benedikt Lebek, Jörg Uffen, Markus Neumann, Bernd Hohler, and Michael H. Breitner. 2014. Information security awareness and behavior: a theory-based literature review. Management Research Review 37, 12 (2014), 1049--1092.Google ScholarGoogle ScholarCross RefCross Ref
  26. Frank Merrett. 2006. Reflections on the Hawthorne effect. Educational Psychology 26, 1 (2006), 143--146.Google ScholarGoogle ScholarCross RefCross Ref
  27. Microsoft. 2021. Microsoft Authenticator. Retrieved June, 2021 from https://www.microsoft.com/en-us/account/authenticator.Google ScholarGoogle Scholar
  28. Sarah Milne, Sheina Orbell, and Paschal Sheeran. 2002. Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions. British journal of health psychology 7, 2 (2002), 163--184.Google ScholarGoogle Scholar
  29. James Nicholson, Ben Morrison, Matt Dixon, Jack Holt, Lynne Coventry, and Jill McGlasson. 2021. Training and Embedding Cybersecurity Guardians in Older Communities. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Malcolm R Pattinson and Grantley Anderson. 2007. How well are information risks being communicated to your computer end-users? Information Management & Computer Security 15, 5 (2007), 362--371.Google ScholarGoogle ScholarCross RefCross Ref
  31. Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, and Sotiris Ioannidis. 2015. Two-factor authentication: is the world ready? Quantifying 2FA adoption. In Proceedings of the eighth european workshop on system security. 1--7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Elissa M Redmiles, Amelia R Malone, and Michelle L Mazurek. 2016. I think they're trying to tell me something: Advice sources and selection for digital security. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 272--288.Google ScholarGoogle ScholarCross RefCross Ref
  33. Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A Usability Study of Five Two-Factor Authentication Methods. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA.Google ScholarGoogle Scholar
  34. Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A usability study of five two-factor authentication methods. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). 357--370.Google ScholarGoogle Scholar
  35. Joshua Reynolds, Trevor Smith, Ken Reese, Luke Dickinson, Scott Ruoti, and Kent Seamons. 2018. A tale of two studies: The best and worst of yubikey usability. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 872--888.Google ScholarGoogle ScholarCross RefCross Ref
  36. Ronald W Rogers. 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1 (1975), 93--114.Google ScholarGoogle Scholar
  37. Paschal Sheeran. 2002. Intention-behavior relations: a conceptual and empirical review. European review of social psychology 12, 1 (2002), 1--36.Google ScholarGoogle Scholar
  38. Paschal Sheeran and Thomas L Webb. 2016. The intention--behavior gap. Social and personality psychology compass 10, 9 (2016), 503--518.Google ScholarGoogle Scholar
  39. Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge. 2007. Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In Proceedings of the 3rd symposium on Usable privacy and security. 88--99.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Sukamol Srikwan and Markus Jakobsson. 2008. Using cartoons to teach internet security. Cryptologia 32, 2 (2008), 137--154.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2020. From Intent to Action: Nudging Users Towards Secure Mobile Payments. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 379--415.Google ScholarGoogle Scholar
  42. Christian Stransky, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, and Sascha Fahl. 2021. On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 437--454.Google ScholarGoogle Scholar
  43. Rick Wash and Molly M Cooper. 2018. Who provides phishing training? facts, stories, and people like me. In Proceedings of the 2018 chi conference on human factors in computing systems. 1--12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Thomas L Webb and Paschal Sheeran. 2006. Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence. Psychological bulletin 132, 2 (2006), 249.Google ScholarGoogle Scholar
  45. C Douglas Wetzel, Paul H Radtke, Hervey W Stern, Jan Dickieson, and JC McLachlan. 1993. Review of the effectiveness of video media in instruction. Technical Report. NAVY PERSONNEL RESEARCH AND DEVELOPMENT CENTER SAN DIEGO CA.Google ScholarGoogle Scholar
  46. Kim Witte. 1996. Fear as motivator, fear as inhibitor: Using the extended parallel process model to explain fear appeal successes and failures. In Handbook of communication and emotion. Elsevier, 423--450.Google ScholarGoogle Scholar
  47. Kim Witte and Mike Allen. 2000. A meta-analysis of fear appeals: Implications for effective public health campaigns. Health education & behavior 27, 5 (2000), 591--615.Google ScholarGoogle Scholar
  48. Affan Yasin, Lin Liu, Tong Li, Rubia Fatima, and Wang Jianmin. 2019. Improving software security awareness using a serious game. IET Software 13, 2 (2019), 159--169.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Azma Alina Ali Zani, Azah Anir Norman, and Norjihan Abdul Ghani. 2018. A Review of Security Awareness Approach: Ensuring Communal Learning. (2018).Google ScholarGoogle Scholar
  50. Leah Zhang-Kennedy, Sonia Chiasson, and Robert Biddle. 2014. Stop clicking on "update later": Persuading users they need up-to-date antivirus protection. In International Conference on Persuasive Technology. Springer, 302--322.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Leah Zhang-Kennedy, Sonia Chiasson, and Robert Biddle. 2016. The role of instructional design in persuasion: A comics approach for improving cybersecurity. International Journal of Human-Computer Interaction 32, 3 (2016), 215--257.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. "Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SACMAT '22: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies
        June 2022
        282 pages
        ISBN:9781450393577
        DOI:10.1145/3532105

        Copyright © 2022 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 June 2022

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate177of597submissions,30%

        Upcoming Conference

        SACMAT 2024

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader