skip to main content
10.1145/3532105.3535013acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

"Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA

Published: 08 June 2022 Publication History

Abstract

The voluntary adoption rate of two-factor authentication (2FA) remains low. This paper investigates whether video-based risk communication messages about Duo 2FA impacts voluntary 2FA adoption rate when delivered by a human speaker versus a cartoon speaker. We conducted an online two-phased survey-based study with 435 university students comprised of those who have not enabled Duo 2FA (non-adopters) on their university account as well as those who had previously enabled Duo 2FA (adopters). Participants in the non-adopters group (139) were assigned to one of the three groups: Threat-R (human speaker video), Threat-A (cartoon speaker video), and Control (no video). We found that 31% of participants enabled Duo 2FA through the human speaker video message compared to 7% with the cartoon speaker video message. However, there was no significant difference between the treatment and control groups (17% of participants enabled Duo 2FA in the Control group). Nevertheless, the treatment group participants showed their intention to activate Duo 2FA on their university account in the future. Those who enabled Duo 2FA rated Duo's usability as good. Moreover, enabling Duo 2FA on university accounts led some participants to enable 2FA on other online accounts. Our findings suggest that risk communication through videos that have a human speaker could increase users' willingness to adopt security features.

Supplementary Material

MP4 File (sacmat02-al-qahtani.mp4)
The study evaluates whether the delivery of video-based risk communication about Duo 2FA by a human presenter or a cartoon presenter affected the adoption of 2FA. We found that a human-presenter video message had more influence on participants than a cartoon video message did. Also, we found Duo 2FA has good usability according to participants who enabled Duo 2FA. Our findings suggest that users may be more willing to adopt security features if the risk is communicated through video messages with a human presenter.

References

[1]
Jemal Abawajy. 2014. User preference of cyber security awareness delivery methods. Behaviour & Information Technology 33, 3 (2014), 237--248.
[2]
Preston Ackerman. 2014. Impediments to adoption of two-factor authentication by home end-users. SANS Institute InfoSec Reading Room (2014).
[3]
Elham Al Qahtani, Lipsarani Sahoo, and Mohamed Shehab. 2021. The Effectiveness of Video Messaging Campaigns to Use 2FA. In International Conference on Human-Computer Interaction. Springer, 369--390.
[4]
Elham Al Qahtani, Mohamed Shehab, and Abrar Aljohani. 2018. The effectiveness of fear appeals in increasing smartphone locking behavior among Saudi Arabians. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 31--46.
[5]
Yusuf Albayram, Mohammad Maifi Hasan Khan, and Michael Fagan. 2017. A study on designing video tutorials for promoting security features: A case study in the context of two-factor authentication (2fa). International Journal of Human--Computer Interaction 33, 11 (2017), 927--942.
[6]
Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, and Nhan Nguyen. 2017. ?... better to use a lock screen than to worry about saving a few seconds of time": Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). 49--63.
[7]
Maha Althobaiti and Pam Mayhew. 2014. Security and usability of authenticating process of online banking: User experience study. Proceedings - International Carnahan Conference on Security Technology 2014, 1--6. https://doi.org/10.1109/CCST.2014.6986978
[8]
Catherine L Anderson and Ritu Agarwal. 2010. Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS quarterly 34, 3 (2010), 613--643.
[9]
Maria Bada, Angela M Sasse, and Jason RC Nurse. 2019. Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 (2019).
[10]
Reuben M Baron and David A Kenny. 1986. The moderator--mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of personality and social psychology 51, 6 (1986), 1173.
[11]
Scott R Boss, Dennis F Galletta, Paul Benjamin Lowry, Gregory D Moody, and Peter Polak. 2015. What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS quarterly 39, 4 (2015), 837--864.
[12]
Jessica Colnago, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Lorrie Cranor, and Nicolas Christin. 2018. "It's not actually that horrible" Exploring Adoption of Two-Factor Authentication at a University. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--11.
[13]
Sanchari Das, Andrew Dingman, and L Jean Camp. 2018. Why Johnny doesn't use two factor a two-phase usability study of the FIDO U2F security key. In International Conference on Financial Cryptography and Data Security. Springer, 160--179.
[14]
Sanchari Das, Gianpaolo Russo, Andrew Dingman, Jayati Dev, Olivia Kenny, and L. Camp. 2017. A Qualitative Study on Usability and Acceptability of Yubico Security Key. (12 2017).
[15]
Björn B De Koning, Huib K Tabbers, Remy MJP Rikers, and Fred Paas. 2007. Attention cueing as a means to enhance learning from an animation. Applied Cognitive Psychology: The Official Journal of the Society for Applied Research in Memory and Cognition 21, 6 (2007), 731--746.
[16]
Duo. 2021. Multi-Factor Authentication from Duo. Retrieved June, 2021 from https://duo.com/product/multi-factor-authentication-mfa.
[17]
Jonathan Dutson, Danny Allen, Dennis Eggett, and Kent Seamons. 2019. Don't Punish all of us: Measuring User Attitudes about Two-Factor Authentication. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 119--128.
[18]
Cori Faklaris, Laura A. Dabbish, and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 61--77.
[19]
Bartlomiej Hanus and Yu "Andy" Wu. 2016. Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective. Information Systems Management 33, 1 (2016), 2--16.
[20]
Marian Harbach, Markus Hettig, Susanne Weber, and Matthew Smith. 2014. Using personal examples to improve risk communication for security & privacy decisions. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 2647--2656.
[21]
Jurjen Jansen and Paul van Schaik. 2019. The design and evaluation of a theory-based intervention to promote security behaviour against phishing. International Journal of Human-Computer Studies 123 (2019), 40--55.
[22]
Yousra Javed and Mohamed Shehab. 2016. Investigating the animation of application permission dialogs: a case study of Facebook. In Data Privacy Management and Security Assurance. Springer, 146--162.
[23]
Jeffrey L Jenkins, Mark Grimes, Jeffrey Gainer Proudfoot, and Paul Benjamin Lowry. 2014. Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time fear appeals. Information Technology for Development 20, 2 (2014), 196--213.
[24]
WA Labuschagne, I Burke, Namosha Veerasamy, and MM Eloff. 2011. Design of cyber security awareness game utilizing a social media framework. In 2011 Information Security for South Africa. IEEE, 1--9.
[25]
Benedikt Lebek, Jörg Uffen, Markus Neumann, Bernd Hohler, and Michael H. Breitner. 2014. Information security awareness and behavior: a theory-based literature review. Management Research Review 37, 12 (2014), 1049--1092.
[26]
Frank Merrett. 2006. Reflections on the Hawthorne effect. Educational Psychology 26, 1 (2006), 143--146.
[27]
Microsoft. 2021. Microsoft Authenticator. Retrieved June, 2021 from https://www.microsoft.com/en-us/account/authenticator.
[28]
Sarah Milne, Sheina Orbell, and Paschal Sheeran. 2002. Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions. British journal of health psychology 7, 2 (2002), 163--184.
[29]
James Nicholson, Ben Morrison, Matt Dixon, Jack Holt, Lynne Coventry, and Jill McGlasson. 2021. Training and Embedding Cybersecurity Guardians in Older Communities. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--15.
[30]
Malcolm R Pattinson and Grantley Anderson. 2007. How well are information risks being communicated to your computer end-users? Information Management & Computer Security 15, 5 (2007), 362--371.
[31]
Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, and Sotiris Ioannidis. 2015. Two-factor authentication: is the world ready? Quantifying 2FA adoption. In Proceedings of the eighth european workshop on system security. 1--7.
[32]
Elissa M Redmiles, Amelia R Malone, and Michelle L Mazurek. 2016. I think they're trying to tell me something: Advice sources and selection for digital security. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 272--288.
[33]
Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A Usability Study of Five Two-Factor Authentication Methods. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA.
[34]
Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A usability study of five two-factor authentication methods. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). 357--370.
[35]
Joshua Reynolds, Trevor Smith, Ken Reese, Luke Dickinson, Scott Ruoti, and Kent Seamons. 2018. A tale of two studies: The best and worst of yubikey usability. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 872--888.
[36]
Ronald W Rogers. 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1 (1975), 93--114.
[37]
Paschal Sheeran. 2002. Intention-behavior relations: a conceptual and empirical review. European review of social psychology 12, 1 (2002), 1--36.
[38]
Paschal Sheeran and Thomas L Webb. 2016. The intention--behavior gap. Social and personality psychology compass 10, 9 (2016), 503--518.
[39]
Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge. 2007. Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In Proceedings of the 3rd symposium on Usable privacy and security. 88--99.
[40]
Sukamol Srikwan and Markus Jakobsson. 2008. Using cartoons to teach internet security. Cryptologia 32, 2 (2008), 137--154.
[41]
Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2020. From Intent to Action: Nudging Users Towards Secure Mobile Payments. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 379--415.
[42]
Christian Stransky, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, and Sascha Fahl. 2021. On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 437--454.
[43]
Rick Wash and Molly M Cooper. 2018. Who provides phishing training? facts, stories, and people like me. In Proceedings of the 2018 chi conference on human factors in computing systems. 1--12.
[44]
Thomas L Webb and Paschal Sheeran. 2006. Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence. Psychological bulletin 132, 2 (2006), 249.
[45]
C Douglas Wetzel, Paul H Radtke, Hervey W Stern, Jan Dickieson, and JC McLachlan. 1993. Review of the effectiveness of video media in instruction. Technical Report. NAVY PERSONNEL RESEARCH AND DEVELOPMENT CENTER SAN DIEGO CA.
[46]
Kim Witte. 1996. Fear as motivator, fear as inhibitor: Using the extended parallel process model to explain fear appeal successes and failures. In Handbook of communication and emotion. Elsevier, 423--450.
[47]
Kim Witte and Mike Allen. 2000. A meta-analysis of fear appeals: Implications for effective public health campaigns. Health education & behavior 27, 5 (2000), 591--615.
[48]
Affan Yasin, Lin Liu, Tong Li, Rubia Fatima, and Wang Jianmin. 2019. Improving software security awareness using a serious game. IET Software 13, 2 (2019), 159--169.
[49]
Azma Alina Ali Zani, Azah Anir Norman, and Norjihan Abdul Ghani. 2018. A Review of Security Awareness Approach: Ensuring Communal Learning. (2018).
[50]
Leah Zhang-Kennedy, Sonia Chiasson, and Robert Biddle. 2014. Stop clicking on "update later": Persuading users they need up-to-date antivirus protection. In International Conference on Persuasive Technology. Springer, 302--322.
[51]
Leah Zhang-Kennedy, Sonia Chiasson, and Robert Biddle. 2016. The role of instructional design in persuasion: A comics approach for improving cybersecurity. International Journal of Human-Computer Interaction 32, 3 (2016), 215--257.

Cited By

View all
  • (2024)The Impact of Risk Appeal Approaches on Users’ Sharing Confidential InformationProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642524(1-21)Online publication date: 11-May-2024
  • (2023)"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure AuthenticationProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623072(2740-2754)Online publication date: 15-Nov-2023

Index Terms

  1. "Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SACMAT '22: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies
      June 2022
      282 pages
      ISBN:9781450393577
      DOI:10.1145/3532105
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 June 2022

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. 2FA
      2. PMT
      3. animation
      4. duo
      5. risk communication
      6. user behavior
      7. video messaging

      Qualifiers

      • Research-article

      Conference

      SACMAT '22
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 177 of 597 submissions, 30%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)51
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 27 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)The Impact of Risk Appeal Approaches on Users’ Sharing Confidential InformationProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642524(1-21)Online publication date: 11-May-2024
      • (2023)"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure AuthenticationProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623072(2740-2754)Online publication date: 15-Nov-2023

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media