UWSpace is currently experiencing technical difficulties resulting from its recent migration to a new version of its software. These technical issues are not affecting the submission and browse features of the site. UWaterloo community members may continue submitting items to UWSpace. We apologize for the inconvenience, and are actively working to resolve these technical issues.
 

The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity

Loading...
Thumbnail Image

Date

2016-03

Authors

Zhang-Kennedy, Leah
Chiasson, Sonia
Biddle, Robert

Journal Title

Journal ISSN

Volume Title

Publisher

Taylor & Francis

Abstract

Although computer security technologies are the first line of defence to secure users, their success is dependent on individuals’ behaviour. It is therefore necessary to persuade users to practice good computer security. Our interview analysis of users’ conceptualization of security password guessing attacks, antivirus protection, and mobile online privacy shows that poor understanding of security threats influences users’ motivation and ability to practice safe behaviours. We designed and developed an online interactive comic series called Secure Comics based on instructional design principles to address this problem. An eye-tracking experiment suggests that the graphical and interactive components of the comics direct users’ attention and facilitate comprehension of the information. In our evaluations of Secure Comics, results from several user studies show that the comics improve understanding and motivate positive changes in security management behaviour. We discuss the implication of the findings to better understand the role of instructional design and persuasion in education technology

Description

This is an Accepted Manuscript of an article published by Taylor & Francis in International journal of human-computer interaction on 2016-03-03, available online: http://www.tandfonline.com/10.1080/10447318.2016.1136177.

Keywords

education technology, computer security

LC Keywords

Citation