Does an Information System Security Notice Format Influence Users’ Compliance Willingness from the Perspective of the Framing Effect?
Abstract
:1. Introduction
2. Literature Review
2.1. Research on the Attribute Framing Effect
2.2. Research on the Goal Framing Effect
2.3. Research on the Risk Framing Effect
2.4. Research on Information Security Cognition
2.5. Individuals Compliance Willingness Related Research
2.6. Theoretical Analysis Framework
2.7. Experimental Hypothesis
3. Methods
3.1. Participants
- (1)
- To ensure that visual fatigue did not occur during the experiment, participants were given regular pauses and rest breaks.
- (2)
- Participants had not taken part in similar framework effect experiments prior to participating in the attribute framework experiment, the goal framework experiment, and the risk framework experiment.
3.2. Experimental Procedure
- (1)
- Attribute Framework Experiment Process
- (2)
- Goal Framework Experiment Process
- (3)
- Risk Framework Experiment Process
3.3. Variable Measurement
4. Results
4.1. Testing the Relationship between Attribute Framework and Compliance Willingness
- (1)
- Hypothetical Test
4.2. Testing of the Relationship between Goal Framework and Compliance Willingness
- (1)
- Hypothetical Test
4.3. Testing the Relationship between Risk Framework and Compliance Willingness
- (1)
- Hypothetical Test
5. Discussion
5.1. Discussion on the Experimental Results of the Attribute Framework
5.2. Discussion on the Experimental Results of the Goal Framework
5.3. Discussion on the Experimental Results of the Risk Framework
5.4. Practical Inspiration
- (1)
- In terms of behavioral will, users should regulate their own information security behavior. Users should pay attention to the decision of compliance with information system security warnings, set strong passwords for system accounts, update security patches regularly, and use security protection software according to the recommended operation settings of security warnings, so as to comply with the prompt requirements of security notices. Users also need to develop a good awareness of information system security notice compliance to avoid risks such as information leakage due to violation of the norms of security warnings. At the same time, users should pay attention to the security notices presented by the information system in a timely manner, especially the security notice situations involving the security of users’ property, and should not ignore the security notices presented by the information system but should always pay attention to them to ensure the security of personal and system information.
- (2)
- In information security cognition, users should strengthen their personal information security awareness. Users need to pay attention to various forms and types of information security training and education to enhance their own information security cognition. Only by realizing the importance of information security at the cognitive level can we control the occurrence of security threats such as information leakage from the root. Users can actively participate in the information security lectures or education training organized by their own organizations to enrich the theoretical knowledge of relevant information security, enrich the knowledge accumulation of personal information security, and avoid unnecessary losses due to certain fake and deceptive nature of security notice links.
- (1)
- Design and use a framework for presenting security notice information that facilitates user compliance. Guiding users’ information security behavior and making users’ compliance with security notices a normal behavior. Security notices are an important part of information system development and design; system developers should avoid complicating the design of security notices and should not abuse security notices. It is better to come from and go to the actual situations of information systems, design suitable security notices according to different situations, and pay attention to the design of the information presentation framework of security notices while complying with different design specifications and summarize the personalized information presentation framework suitable for each situation. The personalized information presentation framework for each situation is summarized, and if necessary, “one situation, one design” is achieved.
- (2)
- Optimize the visual design of security notices. While focusing on the information presentation framework of security notices, attention should also be paid to the graphical design of security notices. Studies have pointed out that window size, button order change, window inverse color, window background color, text background color, and font color are the style design elements of the graphical design of the warning pop-up window. System developers can optimize one or all of these elements according to the specific information system and the characteristics of the information presentation framework of security notices.
- (3)
- It has been shown that, compared to “security tips”, “security warnings” are more attractive to users’ attention when they appear, causing them to devote more cognitive resources to read the warnings carefully, and they are more likely to act in compliance with the text message of the security warning. They are also more likely to comply with the text message.
6. Conclusions and Limitations
6.1. Limitations
6.2. Conclusions
- (1)
- Within the attribute framework experiment, a significant difference was found between users’ compliance willingness with the positive condition compared to the negative condition in the security protection software situation. However, when faced with security notice situations with different attribute framework properties, users with high information security cognition exhibited different compliance willingness. Compliance willingness was not affected by the situation or nor information security cognition in the remaining situations.
- (2)
- In the goal framework experiment, neither the positive nor the negative conditions were associated with significant differences in user compliance willingness in any of the three situations (i.e., strong passwords, security patches, and security protection software). Furthermore, no difference was seen in users’ compliance willingness across the various security notice situations with different goal framework properties in either the high or low information security cognition groups.
- (3)
- In the risk framework experiment, users showed significant differences in their choices of deterministic or uncertain schemes across the various tested situations (i.e., setting strong passwords, updating security patches, and using security protection software). Furthermore, differences were seen in users’ compliance willingness in the high and low information security cognition groups in response to the security notices with different risk framework properties.
- (4)
- Compliance willingness varied according to the framework in which information security cognition was applied.
6.3. Prospects and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
1. Strong Password Setting |
Attribute Framework: (The strong and weak properties of the password-the level of complexity) 【Positivity】When you first register your account for password setting, the confidentiality of your system account depends on the strength of your password, so be sure to set a strong password with high complexity when designing your password. In this case you will set a strong password of your choice. 【Negativity】When you first register your account for password setting, the confidentiality of your system account depends on the strength of the password, so do not set a weak password with low complexity when designing your password. In this case you will set a strong password of your choice. |
Goal Framework: (The degree of security of strong passwords for system accounts) 【Positivity】When you first register your account to log in, you will need to set your password, at which point you will be prompted to pay attention to how strong or weak your password is. If you set a strong password, there is an 80% chance that the system account you are using for work will be secured. At this point you will set a strong password of your choice. 【Negativity】When you first register for an account to log in, you will need to set your password, and you will be prompted to pay attention to how strong or weak your password is. If you set a strong password, there is a 20% chance that the system account you are using for work will be stolen. At this point you will set a strong password of your choice. |
Risk Framework: (The probability of strong passwords to protect system accounts) 【Positivity】The account password of the information system may encounter 600 hacking attacks in a year, and it is necessary to reset the account password to ensure the security of the system account. Below are two options for you to choose from, please select the one you are most likely to comply with. Option A: Setting a strong password can protect the system account from 400 attacks. Option B: Setting a strong password has a 2/3 probability of protecting the system account from attacks and a 1/3 probability of not protecting the system account from 600 attacks. 【Negativity】The account password of the information system may encounter 600 hacking attacks in a year, and it is necessary to reset the account password to ensure the security of the system account. Below are two options for you to choose from, please select the one you are most likely to comply with. Option C: Setting a strong password will expose the system account to 200 attacks. Option D: Setting a strong password has a 2/3 probability of keeping the system account safe from attacks and a 1/3 probability that the system account will be attacked 600 times. |
2. Regularly Updating Security Patches |
Attribute Framework: (Timeliness and relevance of patch installation) 【Positivity】In the process of using the system, the system prompts you to update the patch, because the security patch in the system is time-sensitive and targeted, be sure to install the patch package in time, and select all the security patch content. At this time you will update the security patch will choose. 【Negativity】In the process of using the system, the system prompts you to update the patch, because the security patch in the system is time-sensitive and targeted, do not install the patch package out of date, do not miss the security patch content. At this time, you will update the security patch will choose. |
Goal Framework: (The extent of patching on system data recovery) 【Positivity】In the process of using the system, the system prompts you to update the patch, because the security patch in the system is time-sensitive and targeted, if the patch package is installed in time, there is an 80% possibility to get restored in case of information loss. At this time you will update the security patch will choose. 【Negativity】In the process of using the system, the system prompts you to update the patch, because the security patch in the system is time-sensitive and targeted, if the patch package is installed in time, there is a 20% chance of permanent loss in the event of information loss. At this time you will update the security patch will choose. |
Risk Framework: (Probability of success/failure of software updates) 【Positivity】During the period of using the information system, the system prompts you that there are 20 security patches for your device software that need to be updated in a timely manner. Below are two options for you to choose from, please select the one you are most likely to comply with. Option A: This update will have 15 patches updated successfully. Option B: There is a 3/4 chance that 20 patches will be updated successfully with this update, and a 1/4 chance that no patches will be updated successfully. 【Negativity】During the period of using the information system, the system prompts you that there are 20 security patches for your device software that need to be updated in a timely manner. Below are two options for you to choose from, please select the one you are most likely to comply with. Option C: This update will have 5 patch updates fail. Option D: There is a 3/4 chance that this update will fail without a patch, and a 1/4 chance that the 20-patch update will fail. |
3. Using Security Protection Software |
Attribute Framework: (Versions of Software-Genuine and Pirated) 【Positivity】For security maintenance needs, the system prompts you to use security protection software to ensure the stable operation of the system, as the protection function on the software depends on the system’s data services, it is important to apply genuine security protection software. At this time you will use the security protection software will choose. 【Negativity】For security maintenance needs, the system prompts you to use security protection software to ensure the stable operation of the system, as the protection function on the software depends on the system’s data services, do not use pirated security protection software. At this time you will use the security protection software will choose. |
Goal Framework: (Software prevention against hacking and theft) 【Positivity】For security maintenance purposes, you are prompted to use security protection software to ensure stable system operation. If you use security protection software, you have a 60% chance of being protected from hacker attacks and theft. At this time you will use the security protection software will choose. 【Negativity】For security maintenance purposes, you are prompted to use security protection software to ensure stable system operation. If you use security protection software, there is a 40% possibility of hacking and theft. At this time you will use the security protection software will choose. |
Risk Framework: (The probability of protection of the system by protection software 【Positivity】The security protection software of the information system may encounter 600 attacks in a year. To ensure the stable operation of the system, it is necessary to download and install the security protection software. The download and installation of the security protection software needs to be done on the system website. There are two options for you to choose from, please select the one you are most likely to follow. Option A: The security protection software protects the system from 400 attacks. Option B: The security protection software has a 2/3 probability of protecting the information system from attacks and a 1/3 probability of not protecting the information system from 600 attacks. 【Negativity】The security protection software of the information system may encounter 600 attacks in a year. To ensure the stable operation of the system, it is necessary to download and install the security protection software. The download and installation of the security protection software needs to be done on the system website. There are two options for you to choose from, please select the one you are most likely to follow. Option C: The security protection software will make the information system suffer from 200 attacks. Option D: There is a 2/3 probability that the security protection software will protect the information system from attacks and a 1/3 probability that the information system will be attacked 600 times. |
Appendix B
Attribute Framework Situational Experimentation Practice Session Flow |
The exercise phase: The stimulus material for the exercise phase of the attribute framing experiment was Levin and Gaeth’s (1998) purchase decision problem for different compositions of beef. In the positive attribute framework experimental exercise phase, the situation was described as follows: “Suppose you go to the supermarket to buy beef and the label indicates that 70% of this beef is lean meat. How willing are you to buy this beef?” Respondents responded by pressing a numbered key, ranging from 1 to 7 to indicate their willingness to purchase the meat, with 1 representing “definitely not” and 7 representing “definitely yes”. The larger the number, the stronger the respondent’s willingness to make the purchase. In the negative attribute framework experimental exercise phase, the situation was described as follows: “Suppose you go to the supermarket to buy beef and the label indicates that 30% of this beef is fatty meat. How willing are you to buy this beef?” Respondents responded by pressing a numbered key ranging from 1 to 7 to indicate their willingness to purchase the meat, with 1 representing “definitely not” and 7 representing “definitely yes”. The larger the number, the stronger the respondent’s willingness to make the purchase. |
Goal Framework Situational Experimentation Practice Session Flow |
The exercise phase: The purchase decision problem regarding beef of various compositions, as developed by Levin and Gaeth (1998), again served as the stimulus material for the goal framework experiment’s exercise phase. The positive goal framework experimental exercise phase was described as follows: “Suppose you go to the supermarket to buy beef and the label indicates that 70% of this beef is lean meat. How likely would you be to buy this beef?” In the negative condition, the material was described as follows: “Suppose you go to the supermarket to buy beef and the label indicates that 30% of this beef is fatty meat. How likely would you be to buy this beef?” Subjects responded by pressing a key corresponding a number from 1 to 7 to indicate how likely they would be to purchase the meat, where 1 represents “definitely not” and 7 represents “definitely yes”. The larger the number, the stronger the respondent’s willingness to purchase the meat. |
Risk Framework Situational Experimentation Practice Session Flow |
The exercise phase: The stimulus material for the risk framework experiment exercise phase was Tversky and Kahneman’s (1981) “Asian Disease” problem, regarding disease treatment options. The manner in which the material for the positive–negative risk framework experiment exercise phase was described varied depending on the specific nature of the problem. The material in the positive risk framework condition was described as follows: “Suppose a country is preparing to face a rare epidemic, the onset of which is expected to result in 600 possible deaths. Two responses are possible: Scenario Q, in which 200 people will survive, or Scenario P, in which there is a one in three chance that everyone will survive, but a two in three chance that no one will survive”. The negative condition of the exercise phase is worded as follows: “Suppose a country is preparing to face a rare epidemic, the onset of which is expected to result in 600 possible deaths. Two responses options are possible: Scenario W, in which 400 people will die, or Scenario O, in which there is a one in three chance that no one will die, but a two in three chance that everyone will die.” |
References
- Ali, R.F.; Dominic, P.; Ali, S.E.A.; Rehman, M.; Sohail, A. Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance to compliance. Appl. Sci. 2021, 11, 3383. [Google Scholar] [CrossRef]
- Bornschein, R.; Schmidt, L.; Maier, E. The effect of consumers’ perceived power and risk in digital information privacy: The example of cookie notices. J. Public Policy Mark. 2020, 39, 135–154. [Google Scholar] [CrossRef]
- Tversky, A.; Kahneman, D. The framing of decisions and the psychology of choice. Science 1981, 211, 453–458. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Levin, I.P.; Schneider, S.L.; Gaeth, G.J. All frames are not created equal: A typology and critical analysis of framing effects. Organ. Behav. Hum. Decis. Process. 1998, 76, 149–188. [Google Scholar] [CrossRef] [Green Version]
- Wang, X.T. Self-framing of risky choice. J. Behav. Decis. Mak. 2004, 17, 1–16. [Google Scholar] [CrossRef]
- Wang, X.T. Framing effects: Dynamics and task domains. Organ. Behav. Hum. Decis. Process. 1996, 68, 145–157. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Levy, D.S.; Frethey-Bentham, C.; Cheung, W.K.S. Asymmetric framing effects and market familiarity: Experimental evidence from the real estate market. J. Prop. Res. 2020, 37, 85–104. [Google Scholar] [CrossRef]
- Shan, L.; Diao, H.; Wu, L. Influence of the framing effect, anchoring effect, and knowledge on consumers’ attitude and purchase intention of organic food. Front. Psychol. 2020, 11, 02022. [Google Scholar] [CrossRef]
- Qu, H.; Daniel, J.L. Is “overhead” a tainted word? A survey experiment exploring framing effects of nonprofit overhead on donor decision. Nonprofit Volunt. Sect. Q. 2021, 50, 397–419. [Google Scholar] [CrossRef]
- Zhang, B.; Ritchie, B.; Mair, J.; Driml, S. Can message framings influence air passengers’ perceived credibility of aviation voluntary carbon offsetting messages? J. Sustain. Tour. 2019, 27, 1416–1437. [Google Scholar] [CrossRef]
- Liu, P.; Fei, Q.; Liu, J.; Wang, J. Naming is framing: The framing effect of technology name on public attitude toward automated vehicles. Public Underst. Sci. 2021, 30, 691–707. [Google Scholar] [CrossRef] [PubMed]
- Nuria, R.; van Bavel, R.; José, V.; Briggs, P. Framing effects on online security behavior. Front. Psychol. 2020, 11, 527886. [Google Scholar]
- Wen, T.; Xi, Y.L.; Li, B.; Hu, L. Examining framing effect in travel package purchase: An application of double-entry mental accounting theory. Ann. Tour. Res. 2021, 90, 103265. [Google Scholar] [CrossRef]
- Dixit, A.; Hall, K.D.; Dutta, S. Psychological influences on customer willingness to pay and choice in automated retail settings: Context effects, attribute framing, and perceptions of fairness. Am. J. Bus. 2014, 29, 237–260. [Google Scholar] [CrossRef]
- Gasteiger, C.; Jones, A.S.; Kleinstäuber, M.; Lobo, M.; Horne, R.; Dalbeth, N.; Petrie, K.J. Effects of message framing on patients’ perceptions and willingness to change to a biosimilar in a hypothetical drug switch. Arthritis Care Res. 2020, 72, 1323–1330. [Google Scholar] [CrossRef]
- Meyerowitz, B.E.; Chaiken, S. The effect of message framing on breast self-examination attitudes, intentions, and behavior. J. Personal. Soc. Psychol. 1987, 52, 500–510. [Google Scholar] [CrossRef]
- Yang, X.; Chen, S.C.; Zhang, L. Promoting sustainable development: A research on residents’ green purchasing behavior from a perspective of the goal-framing theory. Sustain. Dev. 2020, 28, 1208–1219. [Google Scholar] [CrossRef]
- Wang, L.; Guo, Z.; Zhang, G. Effective destination user-generated advertising: Matching effect between goal framing and self-esteem. Tour. Manag. 2022, 92, 104557. [Google Scholar] [CrossRef]
- Tanford, S.; Choi, C.; Joe, S.J. The influence of pricing strategies on willingness to pay for accommodations: Anchoring, framing, and metric compatibility. J. Travel Res. 2019, 58, 932–944. [Google Scholar] [CrossRef]
- Ceylan, M.; Hayran, C. Message framing effects on individuals’ social distancing and helping behavior during the COVID-19 pandemic. Front. Psychol. 2021, 12, 579164. [Google Scholar] [CrossRef]
- Degolia, A.H.; Hiroyasu, E.; Anderson, S.E. Economic losses or environmental gains? Framing effects on public support for environmental management. PLoS ONE 2019, 14, e0220320. [Google Scholar] [CrossRef] [PubMed]
- Altay, S.; Mercier, H. Framing messages for vaccination supporters. J. Exp. Psychol. Appl. 2020, 26, 567. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Fehrenbacher, D.D.; Wiener, M. The dual role of penalty: The effects of IT outsourcing contract framing on knowledge-sharing willingness and commitment. Decis. Support Syst. 2019, 121, 62–71. [Google Scholar] [CrossRef]
- Channa, H.; Ricker Gilbert, J.; De Groote, H.; Bauchet, J. Willingness to pay for a new farm technology given risk preferences: Evidence from an experimental auction in Kenya. Agric. Econ. 2021, 52, 733–748. [Google Scholar] [CrossRef]
- Li, M.; Wang, J.; Zhao, P.; Chen, K.; Wu, L. Factors affecting the willingness of agricultural green production from the perspective of farmers’ perceptions. Sci. Total Environ. 2020, 738, 140289. [Google Scholar] [CrossRef] [PubMed]
- Xu, S.; Wang, M.; Liu, Q.; Wang, C.; Zhang, C. Exploring the valence-framing effect: Gain frame enhances behavioral and brain sensitivity to the failure of decision-making under uncertainty. Int. J. Psychophysiol. 2020, 153, 166–172. [Google Scholar] [CrossRef]
- Zhou, W.; Ning, N.; Zhou, Y.; Qiao, J.; Su, Y.; Zhang, X. Influence of framing effect on risk decision-making behavior of medical students in a university in Harbin under the emergency situation. Med. Soc. 2022, 35, 23–26. [Google Scholar]
- Xu, H.; Li, M.; Peng, H. The influence of eye gaze cues on risk decision-making in the economic field: Based on the framing effect paradigm. Psychol. Behav. Res. 2022, 20, 37–44. [Google Scholar]
- Chang, S.; Sun, Y. Influence of cognitive load and emotion on the risk decision frame effect of basketball players. J. Tianjin Inst. Phys. Educ. 2021, 36, 569–573. [Google Scholar]
- Lin, J.; Chen, Y. The frame effect of college students’ risk decision-making in different task areas. J. Guizhou Norm. Univ. 2019, 35, 44–51. [Google Scholar]
- Zheng, M.; Chen, Y.; Chi, X. The influence of college students’ disposable income on risk decision-making under the framework effect. Bus. Econ. 2018, 36, 175–179. [Google Scholar]
- Ki-Aries, D.; Faily, S. Persona-centred information security awareness. Comput. Secur. 2017, 70, 663–674. [Google Scholar] [CrossRef]
- Hadlington, L.; Popavac, M.; Janicke, H.; Yevseyeva, I.; Jones, K. Exploring the role of work identity and work locus of control in information security awareness. Comput. Secur. 2019, 81, 41–48. [Google Scholar] [CrossRef] [Green Version]
- Hadlington, L.; Binder, J.; Stanulewicz, N. Exploring role of moral disengagement and counterproductive work behaviours in information security awareness. Comput. Hum. Behav. 2021, 114, 106557. [Google Scholar] [CrossRef]
- Jaeger, L.; Eckhardt, A. Eyes wide open: The role of situational information security awareness for security-related behaviour. Inf. Syst. J. 2020, 3, 429–472. [Google Scholar] [CrossRef]
- Khando, K.; Shang, G.; Islam, S.M.; Salman, A. Enhancing employees information security awareness in private and public organisations: A systematic literature review-ScienceDirect. Comput. Secur. 2021, 106, 102267. [Google Scholar] [CrossRef]
- van der Schyff, K.; Flowerday, S. Mediating effects of information security awareness. Comput. Secur. 2021, 106, 102313. [Google Scholar] [CrossRef]
- Song, G. The new theory of conformity. Psychol. Sci. 2005, 41, 1174–1178. [Google Scholar]
- Gurses, A.P.; Rosen, M.A.; Pronovost, P.J. Improving guideline compliance and healthcare safety using human factors engineering: The case of Ebola. J. Patient Saf. Risk Manag. 2018, 23, 251604351876283. [Google Scholar] [CrossRef]
- Enwereuzor, I.K.; Adeyemi, B.A.; Onyishi, I.E. Trust in leader as a pathway between ethical leadership and safety compliance. Leadersh. Health Serv. 2020, 33, 201–219. [Google Scholar] [CrossRef]
- Kilbane, H.; Oxtoby, C.; Tivers, M.S. Staff attitudes to and compliance with the use of a surgical safety checklist. J. Small Anim. Pract. 2020, 61, 332–337. [Google Scholar] [CrossRef] [PubMed]
- Kühberger, A. The influence of framing on risky decisions: A meta-analysis. Organ. Behav. Hum. Deci. Process 1998, 75, 23–55. [Google Scholar] [CrossRef] [PubMed]
- Chen, Y.; Wang, Y.; Feng, W. The discipline construction of security information cognition. Sci. Technol. Manag. Res. 2021, 41, 204–210. [Google Scholar]
- Chen, H.; Li, W.; Ke, Y. Research progress on security behavior of organizational employee information system. J. Inf. Syst. 2016, 9, 118–134. [Google Scholar]
Experimental Hypotheses for the Attribute Framework |
H1: Subjects experience framing effects for all three attribute frameworks when presented with security notice situations. |
H1-1: Participants’ compliance willingness choices in the positive and negative format conditions differ significantly when prompted to set up a strong password. |
H1-2: Participants’ compliance willingness choices within the positive and negative format conditions differ significantly when prompted to update security patches regularly. |
H1-3: Participants’ compliance willingness choices in the positive and negative format conditions differ significantly when prompted to use security protection software. |
Experimental Hypotheses for the Goal Framework |
H2: Information security notices presented in all three goal-framed situations demonstrate framing effects. |
H2-1: Participants’ compliance willingness differs significantly according to whether a positive or negative format is used to prompt them to set up a strong password. |
H2-2: Participants’ compliance willingness differs significantly according to whether a positive or negative format is used to prompt them to regularly update their security patches. |
H2-3: Participants’ compliance willingness differs significantly according to whether a positive or negative format is used to prompt them to use security protection software. |
Experimental Hypotheses for the Risk Framework |
H3: Participants demonstrate framing effects when confronted with security notice situations across all three risk frameworks. |
H3-1: Participants’ choice in deterministic and uncertain scenarios differ significantly according to whether a positive or negative format is used to prompt them to set up a strong password. |
H3-2: Participants’ choice in deterministic and uncertain scenarios differ significantly according to whether a positive or negative format is used to prompt them to regularly update their security patches. |
H3-3: Participants’ choice in deterministic and uncertain scenarios differ significantly according to whether a positive or negative format I used to prompt them to use security protection software. |
Information Security Cognition Hypotheses |
H4: Subjects with different levels of information security cognition differ in their compliance willingness with different types of security notice situations according to the different attribute framework used. |
H4-1: Participants with high information security cognition differ in their compliance willingness with security notices depending on the attribute frameworks condition. |
H4-2: Participants with low information security cognition differ in their compliance willingness with security notices depending on the attribute frameworks condition. |
H5: The compliance willingness of participants with different information security cognitive levels differs when presented with different goal frameworks of security notice situations. |
H5-1: Participants with high information security cognition differ in their compliance willingness when presented different goal frameworks of security notice situations. |
H5-2: Participants with low information security cognition differ in their compliance willingness when presented different goal frameworks of security notice situations. |
H6: Participants with different cognitive levels of information security demonstrate different levels of compliance willingness when presented with security notice situations of different risk frameworks. |
H6-1: When faced with security notices of different risk frameworks, users in the high information security cognition group exhibit a different level of compliance willingness. |
H6-2: When faced with security notices of different risk frameworks, users in the low information security cognition group exhibit a different level of compliance willingness. |
Notice Format | Variants | Item Number | KMO | Approximate Cardinality | df | p | Cronbach’s α Coefficient |
---|---|---|---|---|---|---|---|
Attribute Framework | Information security cognition | 11 | 0.838 | 921.675 | 55 | 0 | 0.884 |
User compliance | 4 | 0.839 | 546.509 | 6 | 0 | 0.917 |
Source of Difference | Sum of Squares | df | Mean Square | F | p |
---|---|---|---|---|---|
Intercept | 5740.401 | 1 | 5740.401 | 4403.445 | 0.000 *** |
Situation | 3.326 | 2 | 1.663 | 1.276 | 0.282 |
Framework nature | 15.313 | 1 | 15.313 | 11.746 | 0.001 *** |
Situation × framework nature | 0.131 | 2 | 0.066 | 0.050 | 0.951 |
Residual | 226.829 | 174 | 1.304 |
Situation | Positivity (n = 90) | Negativity (n = 90) |
---|---|---|
Using security protection software | 5.18 ± 1.19 | 5.84 ± 1.06 |
Regularly updating security patches | 5.32 ± 1.16 | 5.88 ± 1.10 |
Setting strong passwords | 5.57 ± 1.31 | 6.10 ± 0.99 |
Situation | Framework Nature | Mean Difference | SE | t | p |
---|---|---|---|---|---|
Using security protection software | positivity–negativity | −0.658 | 0.295 | −2.233 | 0.027 |
Regularly updating security patches | positivity–negativity | −0.558 | 0.295 | −1.894 | 0.060 |
Setting strong passwords | positivity–negativity | −0.533 | 0.295 | −1.809 | 0.072 |
Source of Difference | Sum of Squares | df | Mean Square | F | p |
---|---|---|---|---|---|
Intercept | 5479.638 | 1 | 5479.638 | 4531.888 | 0.000 *** |
Information security cognition | 16.169 | 1 | 16.169 | 13.373 | 0.000 *** |
Framework nature | 14.492 | 1 | 14.492 | 11.986 | 0.001 *** |
Information security cognition × framework nature | 1.207 | 1 | 1.207 | 0.998 | 0.319 |
Residual | 212.807 | 176 | 1.209 |
Information Security Cognition | Positivity (n = 90) | Negativity (n = 90) |
---|---|---|
Low information security cognition | 5.09 ± 1.02 | 5.50 ± 1.08 |
High information security cognition | 5.53 ± 1.32 | 6.27 ± 0.90 |
Information Security Cognition | Nature | Mean Difference | SE | t | p |
---|---|---|---|---|---|
Low information security cognition | positivity–negativity | −0.410 | 0.254 | −1.612 | 0.109 |
High information security cognition | positivity–negativity | −0.742 | 0.215 | −3.456 | 0.001 |
Notice Format | Variants | Item Number | KMO | Approximate Cardinality | df | p | Cronbach’s α Coefficient |
---|---|---|---|---|---|---|---|
Goal Framework | Information security cognition | 11 | 0.838 | 921.675 | 55 | 0 | 0.884 |
User compliance | 4 | 0.843 | 622.443 | 6 | 0 | 0.935 |
Source of Difference | Sum of Squares | df | Mean Square | F | p |
---|---|---|---|---|---|
Intercept | 5811.209 | 1 | 5811.209 | 4883.654 | 0.000 *** |
Situation | 19.169 | 2 | 9.585 | 8.055 | 0.000 *** |
Framework nature | 0.042 | 1 | 0.042 | 0.035 | 0.851 |
Situation × framework nature | 0.469 | 2 | 0.235 | 0.197 | 0.821 |
Residual | 207.048 | 174 | 1.190 |
Situation | Positivity (n = 90) | Negativity (n = 90) |
---|---|---|
Using security protection software | 5.13 ± 1.10 | 5.31 ± 1.29 |
Regularly updating security patches | 5.92 ± 0.85 | 5.88 ± 1.08 |
Setting strong passwords | 5.95 ± 0.83 | 5.91 ± 1.30 |
Situation | Framework Nature | Mean Difference | SE | t | p |
---|---|---|---|---|---|
Using security protection software | positivity–negativity | −0.175 | 0.282 | −0.621 | 0.535 |
Regularly updating security patches | positivity–negativity | 0.042 | 0.282 | 0.148 | 0.883 |
Setting strong passwords | positivity–negativity | 0.042 | 0.282 | 0.148 | 0.883 |
Source of Difference | Sum of Squares | df | Mean Square | F | p |
---|---|---|---|---|---|
Intercept | 5598.737 | 1 | 5598.737 | 4404.222 | 0.000 *** |
Information security cognition | 2.877 | 1 | 2.877 | 2.263 | 0.134 |
Framework nature | 0.094 | 1 | 0.094 | 0.074 | 0.785 |
Information security cognition × framework nature | 0.086 | 1 | 0.086 | 0.068 | 0.795 |
Residual | 223.735 | 176 | 1.271 |
Information Security Cognition | Positivity (n = 90) | Negativity (n = 90) |
---|---|---|
Low information security cognition | 5.49 ± 0.99 | 5.58 ± 1.02 |
High information security cognition | 5.79 ± 0.99 | 5.79 ± 1.39 |
Information Security Cognition | Nature | Mean Difference | SE | t | p |
---|---|---|---|---|---|
Low information security cognition | positivity–negativity | −0.091 | 0.261 | −0.348 | 0.728 |
High information security cognition | positivity–negativity | −0.002 | 0.220 | −0.010 | 0.992 |
Notice Format | Variants | Item Number | KMO | Approximate Cardinality | df | p | Cronbach’s α Coefficient |
---|---|---|---|---|---|---|---|
Risk Framework | Information security cognition | 11 | 0.838 | 921.675 | 55 | 0 | 0.884 |
Situation | Program Nature | Framework Nature (%) | Grand Total | χ2 | p | |
---|---|---|---|---|---|---|
Positivity | Negativity | |||||
Using security protection software | Uncertainty scenarios | 13 (43.33) | 22 (73.33) | 35 (58.33) | 5.554 | 0.018 * |
Deterministic scenarios | 17 (56.67) | 8 (26.67) | 25 (41.67) | |||
Regularly updating security patches | Uncertainty scenarios | 7 (23.33) | 20 (66.67) | 27 (45.00) | 11.38 | 0.001 *** |
Deterministic scenarios | 23 (76.67) | 10 (33.33) | 33 (55.00) | |||
Setting strong passwords | Uncertainty scenarios | 11 (36.67) | 19 (63.33) | 30 (50.00) | 4.267 | 0.039 * |
Deterministic scenarios | 19 (63.33) | 11 (36.67) | 30 (50.00) |
Classification Items | Program Nature | Framework Nature (%) | Grand Total | χ2 | p | |
---|---|---|---|---|---|---|
Positivity | Negativity | |||||
Low information security cognition | Uncertainty scenarios | 12 (33.33) | 25 (64.10) | 37 (49.33) | 7.09 | 0.008 ** |
Deterministic scenarios | 24 (66.67) | 14 (35.90) | 38 (50.67) | |||
High information security cognition | Uncertainty scenarios | 19 (35.19) | 36 (70.59) | 55 (52.38) | 13.18 | 0.000 *** |
Deterministic scenarios | 35 (64.81) | 15 (29.41) | 50 (47.62) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sun, L.; Li, X.; Gao, J.; Cheng, F. Does an Information System Security Notice Format Influence Users’ Compliance Willingness from the Perspective of the Framing Effect? Information 2023, 14, 39. https://doi.org/10.3390/info14010039
Sun L, Li X, Gao J, Cheng F. Does an Information System Security Notice Format Influence Users’ Compliance Willingness from the Perspective of the Framing Effect? Information. 2023; 14(1):39. https://doi.org/10.3390/info14010039
Chicago/Turabian StyleSun, Linhui, Xun Li, Jie Gao, and Fangming Cheng. 2023. "Does an Information System Security Notice Format Influence Users’ Compliance Willingness from the Perspective of the Framing Effect?" Information 14, no. 1: 39. https://doi.org/10.3390/info14010039
APA StyleSun, L., Li, X., Gao, J., & Cheng, F. (2023). Does an Information System Security Notice Format Influence Users’ Compliance Willingness from the Perspective of the Framing Effect? Information, 14(1), 39. https://doi.org/10.3390/info14010039