2013
DOI: 10.1007/978-3-642-42001-6_18
|View full text |Cite
|
Sign up to set email alerts
|

Mental Models – General Introduction and Review of Their Application to Human-Centred Security

Abstract: The human-centred security research area came into being about fifteen years ago, as more and more people started owning their own computers, and it became clear that there was a need for more focus on the non-specialist computer user. The primary attitude fifteen years ago, in terms of how these new users were concerned, was one of exasperation and paternalism. The term "stupid user" was often heard, often muttered sotto voce by an IT specialist dealing with the aftermath of a security incident. A great deal … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(28 citation statements)
references
References 98 publications
0
28
0
Order By: Relevance
“…In the literature there are similar findings that people are more aware of privacy violations than of any other type of violations [47]. Few people mentioned specific aspects such as integrity and availability in a study into online security understanding [19].…”
Section: Explanation 1: No Privacy Awarenessmentioning
confidence: 84%
“…In the literature there are similar findings that people are more aware of privacy violations than of any other type of violations [47]. Few people mentioned specific aspects such as integrity and availability in a study into online security understanding [19].…”
Section: Explanation 1: No Privacy Awarenessmentioning
confidence: 84%
“…The theory of mental models has obscure origins [4,5], but the notion of mental models first appeared in a book written by the psychologist Craik. Craik [6] believed that a brain could translate an external process into a model of the world, which is "a small-scale model of external reality and of its own possible actions within the head."…”
Section: Mental Modelsmentioning
confidence: 99%
“…General techniques to elicit individuals' mental models and team members' shared mental models were summarized in three comprehensive review papers [25][26][27]. Specifically, in the field of HCI, techniques to elicit mental models have four major categories: (1) verbalization through interview, thinking aloud, laddering and so forth: verbalization is the most widely used elicitation technique [5]. However, people's verbalization was inconsistent and tended to evolve as they spoke [28,29].…”
Section: Mental Modelsmentioning
confidence: 99%
“…One drawback of the online survey used here was that it included many elements and website types, meaning that participants could not be asked why they placed each interface element in a certain location without the following drawbacks: they would be pulled out of their task which could increase the time spent filling in the survey and in turn could increase the number of dropouts. Furthermore, asking participants to sketch a prototypical website can result in users drawing how they imagine a website or how they would wish an ideal website to be (Volkamer and Renaud, 2013). Second, the generalizability of our results is to a certain extent limited by the focus on three website types only.…”
Section: Limitationsmentioning
confidence: 95%