{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T06:14:39Z","timestamp":1673936079598},"reference-count":55,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,13]]},"abstract":"

People often unnecessarily disclose identity information online and puts their privacy at risk. Computer warnings mitigate needless identity disclosure. People, however, often click the OK button without reading warning messages. We utilize eye gaze information to provide dynamic warnings. The dynamic warnings are designed to display just-in-time and then fade out after users read them. They are shown right next to the location where users look. We built a restaurant reservation app to evaluate our dynamic warning system. We conducted an experiment with follow-up surveys. The results showed that our dynamic warnings reduced unnecessary identity disclosure and that they were around 5 times more effective than a Windows warning with a close button. We also found that the longer users\u2019 eyes registered on dynamic warning, the less likely users were to provide their identify information in the dynamic warning condition experiment.<\/p>","DOI":"10.4018\/ijisp.303662","type":"journal-article","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T19:17:25Z","timestamp":1657739845000},"page":"1-28","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Warnings"],"prefix":"10.4018","volume":"16","author":[{"given":"Mini","family":"Zeng","sequence":"first","affiliation":[{"name":"Jacksonville University, USA"}]},{"given":"Feng","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of Alabama in Huntsville, USA"}]},{"given":"Sandra","family":"Carpenter","sequence":"additional","affiliation":[{"name":"University of Alabama in Huntsville, USA"}]}],"member":"2432","reference":[{"key":"IJISP.303662-0","unstructured":"Aforge.NET framework. (n.d.). https:\/\/aforgeffmpeg.codeplex.com\/"},{"key":"IJISP.303662-1","first-page":"257","article-title":"Alice in warningland: a large-scale field study of browser security warning effectiveness.","author":"D.Akhawe","year":"2013","journal-title":"Proceedings of the 22nd USENIX Security Symposium"},{"key":"IJISP.303662-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.09.010"},{"key":"IJISP.303662-3","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"IJISP.303662-4","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501610"},{"key":"IJISP.303662-5","author":"E.Brunswick","year":"1952","journal-title":"The conceptual framework of psychology"},{"key":"IJISP.303662-6","doi-asserted-by":"publisher","DOI":"10.1177\/154193129904301603"},{"key":"IJISP.303662-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2013.10.005"},{"key":"IJISP.303662-8","doi-asserted-by":"publisher","DOI":"10.1080\/13669870110062712"},{"key":"IJISP.303662-9","unstructured":"Crane, H. D. (1994). The Purkinje image eyetracker, image stabilization, and related forms of stimulus manipulation. Visual Science and Engineering: Models and Applications, 15\u201389."},{"key":"IJISP.303662-10","doi-asserted-by":"publisher","DOI":"10.1145\/355017.355022"},{"key":"IJISP.303662-11","doi-asserted-by":"publisher","DOI":"10.1016\/0169-8141(94)00032-X"},{"key":"IJISP.303662-12","doi-asserted-by":"publisher","DOI":"10.1016\/0169-8141(94)00032-X"},{"key":"IJISP.303662-13","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"IJISP.303662-14","unstructured":"Emotiv. (n.d.). https:\/\/www.emotiv.com\/"},{"key":"IJISP.303662-15","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557292"},{"key":"IJISP.303662-16","doi-asserted-by":"publisher","DOI":"10.3389\/fnsys.2013.00039"},{"key":"IJISP.303662-17","doi-asserted-by":"publisher","DOI":"10.1145\/123078.128728"},{"key":"IJISP.303662-18","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044451020-4\/50031-1"},{"key":"IJISP.303662-19","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376611"},{"key":"IJISP.303662-20","doi-asserted-by":"publisher","DOI":"10.1518\/107118109X12524444080675"},{"key":"IJISP.303662-21","doi-asserted-by":"publisher","DOI":"10.1145\/2184512.2184580"},{"issue":"6","key":"IJISP.303662-22","first-page":"39","article-title":"Do adolescents attend to warnings in cigarette advertising? An eye-tracking approach.","volume":"34","author":"D. M.Krugman","year":"1994","journal-title":"Journal of Advertising Research"},{"key":"IJISP.303662-23","doi-asserted-by":"publisher","DOI":"10.1177\/1557234X0600200109"},{"key":"IJISP.303662-24","doi-asserted-by":"publisher","DOI":"10.1177\/074391569501200105"},{"key":"IJISP.303662-25","doi-asserted-by":"publisher","DOI":"10.2466\/pms.1991.73.2.595"},{"key":"IJISP.303662-26","doi-asserted-by":"publisher","DOI":"10.1177\/1541931200044028102"},{"key":"IJISP.303662-27","first-page":"63","article-title":"Human Factors Models","author":"M. R.Lehto","year":"2006","journal-title":"Handbook of Warnings"},{"key":"IJISP.303662-28","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078830"},{"key":"IJISP.303662-29","author":"T.Micro","year":"2017","journal-title":"What do Hackers do with Your Stolen Identity? - Security News - Trend Micro USA"},{"key":"IJISP.303662-30","unstructured":"Microsoft. (n.d.). Microsoft Warning Messages. https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/dn742473%28v=vs.85%29.aspx"},{"key":"IJISP.303662-31","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208705"},{"key":"IJISP.303662-32","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813660"},{"key":"IJISP.303662-33","author":"J.Nielsen","year":"2010","journal-title":"Eyetracking web usability"},{"key":"IJISP.303662-34","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.42.1.188"},{"key":"IJISP.303662-35","first-page":"3839","article-title":"WebGazer\u202f: Scalable Webcam Eye Tracking Using User Interactions.","author":"A.Papoutsaki","year":"2016","journal-title":"IJCAI (United States)"},{"key":"IJISP.303662-36","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300748"},{"key":"IJISP.303662-37","doi-asserted-by":"crossref","unstructured":"Racicot, B. M., & Wogalter, M. S. (1995). Effects of a video warning sign and social medeling on behavioral compliance. Pergamon, 27, 57\u201364.","DOI":"10.1016\/0001-4575(94)00046-O"},{"key":"IJISP.303662-38","doi-asserted-by":"crossref","unstructured":"Raja, F., Hawkey, K., Hsu, S., Wang, K.-L., & Beznosov, K. (2011). A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings. Proceedings of the 7th Symposium on Usable Privacy and Security - SOUPS \u201911. doi: https:\/\/doi.acm.org\/10.1145\/2078827.2078829","DOI":"10.1145\/2078827.2078829"},{"key":"IJISP.303662-39","doi-asserted-by":"publisher","DOI":"10.1002\/hbm.22716"},{"key":"IJISP.303662-40","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(01)00916-3"},{"key":"IJISP.303662-41","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0021973"},{"key":"IJISP.303662-42","unstructured":"TheEyeTribe. (2014). TheEyeTribe developers guide. http:\/\/dev.theeyetribe.com\/dev\/"},{"key":"IJISP.303662-43","first-page":"407","article-title":"The fog of warnings: how non-essential notifications blur with security warnings.","author":"A.Vance","year":"2019","journal-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)"},{"key":"IJISP.303662-44","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/14124"},{"key":"IJISP.303662-45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01087-4_2"},{"key":"IJISP.303662-46","doi-asserted-by":"publisher","DOI":"10.1016\/S0896-6273(01)00328-2"},{"key":"IJISP.303662-47","unstructured":"Wogalter, M. S. (1999). Modeling the process. In 1st (Ed.) Handbook of Warnings (pp. 51\u2013107). Mahwah, NJ, USA."},{"key":"IJISP.303662-48","doi-asserted-by":"crossref","unstructured":"Wogalter, M. S. DeJoy, D., & Laughery, K. R. (2005). Warnings and risk communication. CRC Press.","DOI":"10.1201\/9780849375477.ch281"},{"key":"IJISP.303662-49","first-page":"51","article-title":"Communication-Human Information Processing(C-HIP)Model","author":"M. S.Wogalter","year":"2006","journal-title":"Handbook of Warnings"},{"key":"IJISP.303662-50","unstructured":"Wogalter, Michael S, & Vigilante, W. J. (2006). Attention switch and maintenance. In M. S. Wogalter. (Ed.), Handbook of Warnings (pp. 245\u2013265). Mahwah,NJ, USA: Lawrence Erlbaum Associates."},{"key":"IJISP.303662-51","doi-asserted-by":"publisher","DOI":"10.3390\/s21217313"},{"key":"IJISP.303662-52","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.174"},{"key":"IJISP.303662-53","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.06.007"},{"key":"IJISP.303662-54","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078839"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=303662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T21:59:14Z","timestamp":1673906354000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.303662"}},"subtitle":["An Eye Gaze-Based Approach"],"short-title":[],"issued":{"date-parts":[[2022,7,13]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisp.303662","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,13]]}}}