2009
DOI: 10.1016/s1361-3723(09)70139-3
|View full text |Cite
|
Sign up to set email alerts
|

Recognising and addressing ‘security fatigue’

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
54
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 70 publications
(55 citation statements)
references
References 1 publication
1
54
0
Order By: Relevance
“…Stories can be used to encode technical knowledge as they combine events, facts, and experiences within the context of specific situations, making the information more accessible and memorable (Hayne, 2009). Game mechanics that encompass role-plays and storylines can improve learning outcomes by increasing motivation, interest, relatedness, and autonomy (Frost et al, 2015). The use of storytelling in security gamification can also stimulate curiosity and challenge users (Kapp, 2012).…”
Section: Gamified Seta Artefact: Interactive Storytellingmentioning
confidence: 99%
“…Stories can be used to encode technical knowledge as they combine events, facts, and experiences within the context of specific situations, making the information more accessible and memorable (Hayne, 2009). Game mechanics that encompass role-plays and storylines can improve learning outcomes by increasing motivation, interest, relatedness, and autonomy (Frost et al, 2015). The use of storytelling in security gamification can also stimulate curiosity and challenge users (Kapp, 2012).…”
Section: Gamified Seta Artefact: Interactive Storytellingmentioning
confidence: 99%
“…When attempting to raise security Your knowledge in computer security is strong awareness, there are typically a number of issues users experience, namely long-term retention, long term behavioural change and security fatigue. The term "security fatigue" is linked to security awareness, highlighting that even though there are programmes to educate people about security, people may still fail to engage with the good practice they have been taught [33]. Essentially, users can tire of being bombarded with security information and may reject the advice they have been given [34].…”
Section: Fig 2 Participants' Self-reported Knowledge Of Computer Sementioning
confidence: 99%
“…For example, although public Wi-Fi can be insecure, a person might still use it to send an urgent email. Security fatigue [40] describes the cognitive load users face in following security, and a similar concept might exist for privacy. While privacy can still be aspired to as a principle, it is often sacrificed due to practical necessity.…”
Section: E the Opinion-action Disparitymentioning
confidence: 99%