Experimental large-scale review of attractors for detection of potentially unwanted applications
Authors | |
---|---|
Year of publication | 2018 |
Type | Article in Periodical |
Magazine / Source | Computers & Security |
MU Faculty or unit | |
Citation | |
Web |
|
Doi | http://dx.doi.org/10.1016/j.cose.2018.02.017 |
Keywords | PUA; PUP; usable security; usability |
Attached files | |
Description | While malicious software (malware) is designed to disrupt or damage computer systems, potentially unwanted applications (PUAs) combine useful features with less desirable ones, such as adware or spyware. Unlike anti-malware solutions, removing PUAs can be controversial, for both the PUA owners and also the users who might wish to accept the PUA features. Thus, solutions for removing PUAs require users to make their removal decisions. In this paper we investigate the effectiveness of 15 screen variants that use different ``security warning attractors'' designed to encourage users to enable PUA detection when they are installing a security software solution from the online security software company ESET. Our live field study with close to 750,000 software installations by end users in 222 countries shows that a small change of switching the order of the options presented using radio buttons and offering the ``enable detection'' option first was the most effective (and was later set as the option of choice by ESET). The chosen approach led to a significant reduction of non-consenting users from 17.9% to 11.1%. Other features, such as the use of colours and pictorials, which have previously demonstrated their effectiveness with more traditional SSL security warnings, did not yield significant improvements for enabling PUA detection. |
Related projects: |