A Study on Designing Video Tutorials for Promoting Security Features: A Case Study in the Context of Two-Factor Authentication (2FA)
- 28 February 2017
- journal article
- research article
- Published by Taylor & Francis Ltd in International Journal of Human–Computer Interaction
- Vol. 33 (11), 927-942
- https://doi.org/10.1080/10447318.2017.1306765
Abstract
This article investigates the effectiveness of informational videos that are designed to provide an introduction to two-step verification (i.e., 2FA) and in turn seeks to improve the adoption rate of 2FA among users. Toward that, eight video tutorials based on three themes (e.g., Risk, Self-efficacy, and Contingency) were designed, and a three-way between-group study with 399 participants on Amazon’s MTurk was conducted. Furthermore, a follow-up study was run to see the changes in participants’ behavior (e.g., enabling of 2FA). The Self-efficacy and Risk themes were found to be the most effective in making the videos more interesting, informative, and useful. Willingness to try 2FA was found to be higher for participants who were exposed to both the Risk and Self-efficacy themes. Participants’ decisions regarding actually enabling 2FA was found to be significantly correlated with how interesting, informative, and useful the videos were. Implications of our findings in a broader context are discussed in the article.Funding Information
- National Science Foundation (CNS-1251962)
This publication has 25 references indexed in Scilit:
- More Is Not the AnswerIEEE Security & Privacy, 2013
- Authentication at ScaleIEEE Security & Privacy, 2012
- User preference of cyber security awareness delivery methodsBehaviour & Information Technology, 2012
- Security services as coping mechanisms: an investigation into user intention to adopt an email authentication serviceInformation Systems Journal, 2012
- Death by a thousand factsInformation Management & Computer Security, 2012
- Risk Communication Design: Video vs. TextLecture Notes in Computer Science, 2012
- Factors affecting perception of information security and their impacts on IT adoption and security practicesInternational Journal of Human-Computer Studies, 2011
- “More than words”: screencasting as a reference toolReference Services Review, 2009
- User acceptance of information technology: system characteristics, user perceptions and behavioral impactsInternational Journal of Man-Machine Studies, 1993
- Dual coding theory and educationEducational Psychology Review, 1991