top of page

S-Cube: Security and Privacy Support Systems for Users on the Web

Motivation and Big Picture

We started to note from data that we found from a variety of sources that user behavior when it came to their safety and security on the web seemed to remain problematic. Perceptions of passwords that were weak deemed them mostly unimportant. As such, we saw a need to build a Security and Privacy Support System that would not only monitor  and report user activity but through a behavioral change model seek to engender a more secure thought process within its users. Up until now we have attempted to guage different behavioral  models that we could use to model our web extension after and then measure the constructs within .

ELM and its Alternatives

 
Elaboration Liklihood Model:
​

The Elaboration Likelihood Model suggests that attitude change among individuals may be caused by two "routes" of influence, the central route and the peripheral route, which differ in the amount of thoughtful information processing or "elaboration" demanded of individual subjects [1]. The central route requires a person to think critically about issue-related arguments in an informational message and analyze the merits and relevance of those arguments prior to forming an informed judgment about the target behavior. In IT acceptance contexts, such arguments may refer to the potential benefits of system acceptance, comparison of alternative systems, availability and quality of system support, and/or costs of and returns from system acceptance. The peripheral route involves less cognitive effort, where subjects rely on cues regarding the target behavior, such as number of prior users, endorsements from IT experts, ease of use, navigation and visual appeal [2], rather than on the quality of arguments, in attitude formation [3].


Exploring the use of ELM in IT acceptance, one of the key findings of Bhattacharjee and Sanford’s paper [7] is that both the central and peripheral routes are acceptable ways of influencing users to accept anything new in IT. While it suggests that attitude change and usefulness perceptions caused by central route processing are more stable and long-term, it also says that both the routes are not mutually exclusive and can be used in conjunction with each other as it was noted that one's usefulness perceptions can be shaped by both argument quality (a central cue) and source credibility (a peripheral cue). 


Another paper [8] discusses the processing of information security messages from an ELM perspective. It suggests two models to study the effects of security message characteristics (argument quality and argument quantity), general security orientation, need for cognition, personal relevance and prior knowledge on users’ attitudes towards security using ELM. The first model is designed to study how argument quality and quantity affect users’ attitudes depending on the processing route (central or peripheral) they take. The second model then studies how the rest of the factors affect elaboration likelihood. This paper not only justifies the selection of these factors but also provides standardized questionnaire items from previous studies that could measure these variables. 


Moreover, ELM has also previously been explored in the context of mobile banking [3]. This study examines users’ initial trust in mobile banking using a comprehensive questionnaire. The results show that both central and peripheral cues have significant effects on initial trust, where central cues include information quality (relevancy, sufficiency, accuracy and currency) and service quality (service reliability, promptness, assurance and personalization), and peripheral cues include system quality (access speed, ease-of-use, navigation and visual appeal), reputation (source credibility) and structural assurance. Among these, information quality, system quality and structural assurance have relatively larger effects on building user trust. It was found that users expect to get relevant, accurate and timely information. Moreover, system quality including visual appeal and navigation structure influence the user’s first impression toward mobile banking; poor interface design can lead to the user doubting the service provider’s ability to provide quality services. Structural assurance is also an important factor that informs user trust. Compared to online banking, mobile banking built on wireless network is vulnerable to eavesdropping and information interception so the service provider needs to assure the user that their information will remain safe. 

​

Alternatives to ELM:
​

Harri Oinas-Kukkonen and Marja Harjumaa also present a framework [9] to design and evaluate persuasive systems. Relying mostly on Fogg’s functional triad whereby persuasive technologies can act as a tool, media or social actors or as a combination of the above. As such for a persuasive system to be developed a system may rely on providing primary task, dialogue, system credibility, or social support. The following would be an explanation of what each of these might entail:

  • Primary Task Support

    • The design principles in this category support the carrying out of the user’s primary task. The design principles in this category are a reduction, tunneling, tailoring, personalization, self-monitoring, simulation, and rehearsal

    • The authors caution against the use of conditioning and surveillance as a means of persuasion

  • Dialogue Support

    • The design principles related for implementing computer-human dialogue support in such a manner that helps users keep moving towards their goal or target behavior include praise, rewards, reminders, suggestion, similarity, liking, and social role.

  • System Credibility 

    • The design principles in the system credibility category describe how to design a system so that it is more credible and thus more persuasive. The category of system credibility composes of trustworthiness, expertise, surface credibility, real-world feel, authority, third-party endorsements, and verifiability

  • Social Support

    • The design principles in the social support category describe how to design the system so that it motivates users by leveraging social influence. The design principles that belong into this category, are social facilitation, social comparison, normative influence, social learning, cooperation, competition, and recognition

 

A detailed overview of how these can be implemented can be found in tabulated form in the cited paper.

McCarney et al presented the design implementation and evaluation of a password manager [10]. They relied on the Usability Deployability and security Framework defined by Bonneau et al. where a security solution for the web like a password manager must fulfill standards in each of the above avenues in order to be a robust and useful solution. As such an inbetween study was conducted with the following conditions Firefox with no master password (NMP), Firefox with a user-chosen master password (MP), and Tapas. All solutions were measured on the following variables for the purpose of brevity variables of usability are mentioned:

  • Usability

    • Memorywise-Effortless

    •  Scalable-for-Users

    • Nothing-to-Carry

    • Physically-Effortless

    • Easy-to-Learn

    • Efficient-to-Use

    • Infrequent-Errors

    • Easy-Recovery-from-Loss 

 

Variables for Peripheral and Core routes:

In order for us to effectively develop some theory for our designs, we would first need to identify cues that would allow us to attribute facets of our design to some peripheral cues as mentioned by insert source here are: 

  • Source Expertise

  • Source Likability 

  • Argument Quantity

  • Visual salience [3]: The visual design of a website is important because it improves website aesthetics and emotional appeal, which in turn may culminate in positive attitudes or trust. Visual design encompasses elements such as images, photographs, colors, shapes, or font types. A combination of pictures and information on a website improves user recall better than text alone.

  • Navigation Design: Navigation design refers to the navigational scheme employed to help users as they access different sections of a website. This could include whether text is horizontal or vertical, and the number of drop-down menus or submenus. Without a clear and facilitated path to information, users become lost within the Web structure. Well-designed navigation schemes save time for online consumers leading to trust and satisfaction. Navigation Design refers to ease of use and navigation of the website.

  • Social Presence: Social Presence is defined as “the extent to which a medium allows users to experience others as being psychologically present”. Based on prior research, Social Presence refers to a website for which users perceive it to have a sense of human contact, personalness, sociability, as well as human warmth and sensitivity. In the context of hedonic consumer interactions, perceived social presence has received considerable attention as an antecedent to online consumer enjoyment and trust, website involvement, and utilitarian outcomes such as perceived usefulness or effectiveness.

​

​

  1. Petty, Richard E. “The Elaboration Likelihood Model of Persuasion.” (1986).http://cyber.scihub.tw/MTAuMTAxNi9zMDA2NS0yNjAxKDA4KTYwMjE0LTI=/10.1016%40s0065-2601%2808%2960214-2.pdf

  2. Anthony Vance, Christophe Elie-Dit-Cosaque & Detmar W. Straub. “Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture.” Journal of Management Information Systems, 2014.http://cyber.sci-hub.tw/MTAuMjc1My9taXMwNzQyLTEyMjIyNDA0MDM=/10.2753%40mis0742-1222240403.pdf

  3. Zhou, Tao. “Understanding Users’ Initial Trust in Mobile Banking: An Elaboration Likelihood Perspective.” Computers in Human Behaviour, 2012.http://cyber.scihub.tw/MTAuMTAxNi9qLmNoYi4yMDEyLjAzLjAyMQ==/10.1016%40j.chb.2012.03.021.pdf

  4. Cyr, Dianne & Head, Milena & Lim, Eric & Stibe, Agnis. (2018). Using the Elaboration Likelihood Model to Examine Online Persuasion through Website Design. Information & Management. 10.1016/j.im.2018.03.009.https://www.researchgate.net/publication/323977472_Using_the_Elaboration_Likelihood_Model_to_Examine_Online_Persuasion_through_Website_Design

  5. Dey, Sanorita & Duff, Brittany & Karahalios, Karrie & Fu, Wai-Tat. (2017). The Art and Science of Persuasion: Not All Crowdfunding Campaign Videos are The Same. 755-769. 10.1145/2998181.2998229.http://sdey4.web.engr.illinois.edu/CrowdfundingVideoAnalysis.pdf

  6. Angst, Corey M., and Ritu Agarwal. “Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion.” MIS Quarterly, vol. 33, no. 2, 2009, pp. 339–370. JSTOR, https://www.jstor.org/stable/pdf/20650295.pdf?ab_segments=0%2Fdefault-2%2Fcontrol

  7. Bhattacherjee, Anol, and Clive Sanford. “Influence Processes for Information Technology Acceptance: An Elaboration Likelihood Model.” MIS Quarterly, vol. 30, no. 4, 2006, pp. 805–825. JSTOR,https://www.jstor.org/stable/pdf/25148755.pdf?refreqid=excelsior%3Afa82616a9c2bc02f2082519837e94f13

  8. Ng, Boon-Yuen and Atreyi Kankanhalli. “Processing Information Security Messages: An Elaboration Likelihood Perspective.” ECIS (2008).https://pdfs.semanticscholar.org/88a9/f561af6947a7bfc6558251350d7f9d5b68f0.pdf?_ga=2.181310821.319615309.1563109415-1403746961.1562915708

  9. Oinas-Kukkonen, Harri, and Marja Harjumaa. "A systematic framework for designing and evaluating persuasive systems." International conference on persuasive technology. Springer, Berlin, Heidelberg, 2008

  10. McCarney, Daniel, et al. "Tapas: design, implementation, and usability evaluation of a password manager." Proceedings of the 28th Annual Computer Security Applications Conference. ACM, 2012.

  11. Petty, Richard E., and John T. Cacioppo. "The elaboration likelihood model of persuasion." Communication and persuasion. Springer, New York, NY, 1986. 1-24.

Experimental Design (proposed)

In our experimental design, we aim to develop an experimental methodology that will allow us to gauge the impact of a particular construct within the ELM literature with respect to persuasion. We will test an assortment of core and peripheral cues and attempt to delineate their individual impact on the following variables: Trust, issue involvement and attitude change.  As we have noted in the literature, work has been done to delineate the effects of a plethora of cues on the aforementioned variables, however, very little if any has been done to ascertain the effects of these cues within the realm of privacy and security. As such this will remain our most important contribution. What is also important to note that the cues that we have selected either aim to impact attitude change directly or through the mediating constructs of trust and issue involvement.  The cues that we have selected are as follows:

  • Argument Quality

  • Argument Quantity

  • Goal Visualisation (Visual Presentation)

  • Social Presence

These cues will be tested additively by adding a cue as it has been illustrated in the literature over the previous treatment that has been tested positively as such we aim to test 5 versions using an in-between study design where each group is exposed to a singular treatment. version 0 will be tested with a control group of users where these cues would be minimized in order to get the baseline performance of S-cube.In the same vein, the following sections aim to explain the reasoning and methodology through which a cue is integrated into S-cube.

 

Argument Quality: 

The definition of Argument quality while might seem intuitive manipulation of such a construct requires a theoretical approach. We note that for the syllogistic conceptualization of argument quality, a definition of a strong or a weak argument seems to depend on “idiosyncratic manipulations of message content that ultimately affect message valence.”[1]. Hunt, Smith, and Kernan [13] manipulated argument quality by defining strong arguments as statements of tangible product features and weak arguments as statements of intangible features. Petty and Cappacio[3] defined weak and strong arguments with respect to the relevance of the argument to the particular student context while Tao[4] defined information quality as consisting of Relevancy, Sufficiency, Accuracy, and Currency. However, we feel that such argumentative manipulation fails to provide us with a clear representation of complex argumentative messaging and thus we use Argument quality as conceptualized by Boller et.al [1]: in terms of argument structure. As such we aim to provide an argument that closely follows the  Toulmin’s jurisprudence model. While Toulmin describes 6 crucial elements of an argument Boller et.al defines 4 components namely claim assertions, evidence, and authority, and probability. In our Argument Quality Condition, we aim to provide an argument that includes all of the above elements to provide a robust argument. 

 

As such with the Argument Quality treatment we will present argumentative messages regarding the security practices of users when information such as passwords, credit card information or personal information is shared on the web. As such we seek to confirm Cyr et.al’s [2] hypothesis with respect to argument quality.

 

H1: Argument quality positively impacts issue involvement


 

Argument Quantity:

The definition of argument quantity in our particular context is the frequency by which a user is exposed to arguments regarding the user’s browsing habits and their impact upon their privacy and security.  As illustrated by petty and Cacioppo [3] argument quantity is important in lower elaboration studies with two studies both of them identifying that in lower relevance situations the number of arguments played an important role in persuasion, this was then replicated by Duan et.al  [14] who illustrated that in the eWOM context, the number of online reviews as an attribute of peripheral cue exerted significant influences on consumer decision-making. As such we postulate that 

 

H2: Argument quantity is positively related to attitude towards safer online practices

 

For this treatment, we aim to present the same arguments in regards to developing better security practices the form of desktop notifications where a summary of the user's web activity and performance will be given and the user through this we hope to affect user attitude towards safer online practices.

 

Goal Visualisation:

Cheema et al identifies Goal visualization as a mechanism to increase motivation as people approach said Goals citing  Larkin and Simon and Naylor and Igen who state that Visual representation of a goal is easier to process than other forms of representations while enhancing the people's ability to visualize their goals may increase the perception of goal proximity leading to increased effort. Such was then tested in settings ranging from professional swimming competitions to research labs. There was also work done which showed that in the ease of visualization led to an increase in the commitment to save money when users were closer to their Goal. We can also note that infographics and visualizations can be seen to increase Elaboration making the user more cognitively active when reading or receiving the messages that he/she is being presented [11]. 

 

Hence adding a visualization bar that displays the health of the user or providing a scoring board may help in increasing motivation and elaboration something that may lead to both long term adherence and persuasion. As such we postulate that 

 

H3: Goal Visualisation will have a positive impact on the user’s Issue Involvement

 

Social Presence:

In the fourth treatment, we aim to add Social presence.  social presence has been conceptualized as the warmth, sociability, and feeling of human contact that can be conveyed through a website, as a communication medium [5].  While Ha and James [8] define connectedness as “the feeling of being able to link to the outside world to broaden one’s experience easily. the need for connectedness has been linked with success in life and mental health [6] while also being deemed as one of the three basic motivating principles underlying Social behavior[7]. 

In the case of Social Presence, the aforementioned could be conceptualized as a web extension that may provide varying levels of personalness, sociability, human warmth, sensitivity, and a sense of Human Contact. We also note that Social presence has been shown to have positive impacts on both user trust and perceived usefulness, as illustrated by Khaled et. al in the context of e-commerce,thus, we aim to inculcate social presence into our extension through the use of an avatar who will be ever present throughout the web extension providing assistance, encouragement, and reviews to the user allowing for a dialogue between the user and the extension, hence leading us to two hypotheses:

 

H4: Social Presence will positively impact trust

H5: Social Presence will positively impact issue involvement

​

​

Works Cited
  1. Boller, Gregory W., John L. Swasy, and James M. Munch. "Conceptualizing argument quality via argument structure." ACR North American Advances (1990)

  2. Cyr, Dianne, et al. "Using the elaboration likelihood model to examine online persuasion through website design." Information & Management 55.7 (2018): 807-821.

  3. Petty, R. E., & Cacioppo, J. T. (1984). The effects of involvement on responses to argument quantity and quality: Central and peripheral routes to persuasion. Journal of Personality and Social Psychology, 46(1), 69-81.

  4. Zhou, Tao. “Understanding Users’ Initial Trust in Mobile Banking: An Elaboration Likelihood Perspective.” Computers in Human Behaviour, 2012.

  5. Gefen, D., Karahanna, E. and Straub, D.W. “Trust and TAM in Online Shopping: An Integrated Model.” MIS quarterly, 27, 51-90, 2003.

  6. Adler, A., and Brett, C., (Ed.), 1998, Social Interest: Adler's Key to the Meaning of Life. Oneworld Publications, Oxford, United Kingdom. 

  7. Smith, E. and Mackie D., 2000, Social Psychology, 2nd Edition. Psychology Press, New York, USA. 

  8. Ha, Louisa, and E. Lincoln James. "Interactivity reexamined: A baseline analysis of early business web sites." Journal of broadcasting & electronic media 42.4 (1998): 457-474.

  9. Martino, Jessica, Jennifer Pegg, and Elizabeth Pegg Frates. "The connection prescription: using the power of social interactions and the deep desire for connectedness to empower health and wellness." American journal of lifestyle medicine11.6 (2017): 466-475.

  10. Lee, Thae Min. "The impact of perceptions of interactivity on customer trust and transaction intentions in mobile commerce." Journal of Electronic Commerce Research 6.3 (2005): 165.

  11. Hassanein, Khaled, and Milena Head. "Manipulating perceived social presence through the web interface and its impact on attitude towards online shopping." International Journal of Human-Computer Studies 65.8 (2007): 689-708

  12. Lazard, Allison, and Lucy Atkinson. "Putting environmental infographics center stage: The role of visuals at the elaboration likelihood model’s critical point of persuasion." Science Communication 37.1 (2015): 6-33.

  13. Hunt, James M., Smith, Michael F. and Jerome B. Kernan (1985), "The Effects of Expectancy Disconfirmation and Argument Strength on Message Processing Level: An Application to Personal Selling," in Advances in Consumer Research, eds., E. C. Hirschman and M. B. Holbrook, Association for Consumer Research, 450-454.

  14. Duan, Wenjing, Bin Gu, and Andrew B. Whinston. "Do online reviews matter?—An empirical

bottom of page