Abstract
Visual appeal has been shown to influence perceptions of usability and credibility, and we hypothesize that something similar is happening with user judgments of website security: What is beautiful is secure. Web certificates provide reliable information about a website’s level of security, presented in browser interfaces. Users should use this to inform their trust decisions online, but evidence from laboratory studies and real-world usage suggests that they do not. We conducted two studies—one in lab, and one online—in which participants view and interact with websites with high and low visual appeal, and various security levels, and then make security-related judgments. In both studies, participants consistently rated visually appealing websites as more secure, and indicated they would be more likely to enter sensitive information into visually appealing websites—even when they were less secure. Our results provide evidence that users rely on visual appeal when making security and trust decisions on websites. We discuss how these results may be used to help users.
- [1] . 2021. APWG Phishing Activity Trends Report. Anti-Phishing Working Group. Retrieved March 21, 2022 from https://docs.apwg.org/reports/apwg_trends_report_q4_2020.pdf.Google Scholar
- [2] . 2020. An analysis of phishing blacklists: Google safe browsing, OpenPhish, and PhishTank. In Proceedings of the Australasian Computer Science Week Multiconference (Melbourne, Australia). ACM, New York, NY, USA, 1–11.Google Scholar
Digital Library
- [3] . 2011. Bridging the gap in computer security warnings: A mental model approach. IEEE Symposium on Security and Privacy (SP’11) 9, 2 (
3 2011), 18–26.DOI: Google ScholarDigital Library
- [4] . 1996. SUS: A quick and dirty usability scale. In Usability Evaluation in Industry. Taylor & Francis, London, UK, 189–194.Google Scholar
- [5] . 2019. Online panels in social science research: Expanding sampling methods beyond Mechanical Turk. Behavior Research Methods 51, 5 (2019), 2022–2038.Google Scholar
Cross Ref
- [6] . 2019. EV UI Moving to Page Info. Google. Retrieved April 10, 2022 from https://chromactivelyium.googlesource.com/chromium/src/+/HEAD/docs/security/ev-to-page-info.md.Google Scholar
- [7] . 1988. Statistical Power Analysis for the Behavioral Sciences (2nd ed.). L. Erlbaum Associates, Hillsdale, NJ, USA.Google Scholar
- [8] . 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile.
RFC 5280. RFC Editor. https://www.rfc-editor.org/info/rfc5280.Google ScholarCross Ref
- [9] . 2014. Defining cybersecurity. Technology Innovation Management Review 4 (
10 2014), 13–21.DOI: Google ScholarCross Ref
- [10] . 1972. What is beautiful is good. Journal of Personality and Social Psychology 24, 3 (1972), 285.Google Scholar
Cross Ref
- [11] . 1995. Beauty. In The Cambridge Dictionary of Philosophy, (Ed.). Cambridge University Press, Cambridge, UK, 16.Google Scholar
- [12] . 2016. Rethinking connection security indicators. In Twelfth Symposium on Usable Privacy and Security (SOUPS’16). USENIX Association, Denver, CO, 1–14. https://www.usenix.org/conference/soups2016/technical-sessions/presentation/porter-felt.Google Scholar
- [13] . 2001. What makes web sites credible? A report on a large quantitative study. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, 61–68.Google Scholar
Digital Library
- [14] . 2003. Darwinian aesthetics: Sexual selection and the biology of beauty. Biological Reviews 78, 3 (2003), 385–407.Google Scholar
Cross Ref
- [15] . 2004. The interplay of beauty, goodness, and usability in interactive products. Human–Computer Interaction 19, 4 (2004), 319–349.Google Scholar
Digital Library
- [16] . 2018. ISO 9241-11:2018(en): Ergonomics of Human-system Interaction – Part 11: Usability: Definitions and Concepts.
Standard . International Organization for Standardization, Geneva, Switzerland.Google Scholar - [17] . 2007. What instills trust? A qualitative study of phishing. In International Conference on Financial Cryptography and Data Security. Springer, New York, NY, USA, 356–361.Google Scholar
Cross Ref
- [18] . 2008. Beanplot: A boxplot alternative for visual comparison of distributions. Journal of Statistical Software 28, 1 (2008), 1–9.Google Scholar
- [19] . 1962. Some characteristics of intrajudge trait intercorrelations. Psychological Monographs: General and Applied 76, 33 (1962), 1.Google Scholar
Cross Ref
- [20] . 1995. Apparent usability vs. inherent usability: Experimental analysis on the determinants of the apparent usability. In Conference Companion on Human Factors in Computing Systems (Denver, Colorado, USA) (
CHI’95 ). ACM, New York, NY, USA, 292–293.DOI: Google ScholarDigital Library
- [21] . 2004. Assessing dimensions of perceived visual aesthetics of web sites. International Journal of Human-Computer Studies 60, 3 (2004), 269–298.Google Scholar
Digital Library
- [22] . 2010. Understanding user preferences based on usability and aesthetics before and after actual use. Interacting with Computers 22, 6 (2010), 530–543.Google Scholar
Digital Library
- [23] . 2011. An exploration of relations between visual appeal, trustworthiness and perceived usability of homepages. ACM Transactions on Computer-Human Interaction (TOCHI) 18, 1 (2011), 1–30.Google Scholar
Digital Library
- [24] . 2006. Attention web designers: You have 50 milliseconds to make a good first impression! Behaviour & Information Technology 25, 2 (2006), 115–126.Google Scholar
Cross Ref
- [25] . 2017. TurkPrime.com: A versatile crowdsourcing data acquisition platform for the behavioral sciences. Behavior Research Methods 49, 2 (2017), 433–442.Google Scholar
Cross Ref
- [26] . 2011. Facial attractiveness: Evolutionary based research. Philosophical Transactions of the Royal Society B: Biological Sciences 366, 1571 (2011), 1638–1659.Google Scholar
Cross Ref
- [27] . 2007. Emotional experiences and quality perceptions of interactive products. In Human-Computer Interaction. Interaction Design and Usability, (Ed.). Springer Berlin, Berlin, 164–173.Google Scholar
- [28] . 2007. Studying antecedents of emotional experiences in interactive contexts. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (San Jose, California, USA) (
CHI’07 ). ACM, New York, NY, USA, 915–918.DOI: Google ScholarDigital Library
- [29] . 2013. A short version of the visual aesthetics of websites inventory. Behaviour & Information Technology 32, 12 (2013), 1305–1311.Google Scholar
Digital Library
- [30] . 2020. Browser Market Share. Net Applications. Retrieved July 21, 2020 from https://netmarketshare.com/browser-market-share.aspx.Google Scholar
- [31] . 2011. The operating characteristics of the nonparametric Levene test for equal variances with assessment and evaluation data. Practical Assessment, Research, and Evaluation 16, 1 (2011), 5.Google Scholar
- [32] . 1986. Cognitive engineering. In User Centered System Design: New Perspectives on Human-Computer Interaction, and (Eds.). CRC Press, Boca Raton, FL, USA, 266–290.Google Scholar
- [33] . 2004. Emotional Design: Why We Love (or Hate) Everyday Things. Basic Books, New York, NY, USA.Google Scholar
Digital Library
- [34] . 2017. An experimental investigation of the influence of website emotional design features on trust in unfamiliar online vendors. Computers in Human Behavior 67 (2017), 49–60.Google Scholar
Digital Library
- [35] . 2011. Power comparisons of Shapiro-Wilk, Kolmogorov-Smirnov, Lilliefors and Anderson-Darling tests. Journal of Statistical Modeling and Analytics 2, 1 (2011), 21–33.Google Scholar
- [36] . 2010. Aesthetic package design: A behavioral, neural, and psychological investigation. Journal of Consumer Psychology 20, 4 (2010), 431–441.Google Scholar
Cross Ref
- [37] . 2006. The evolutionary psychology of facial beauty. Annual Review of Psychology 57 (2006), 199–226.Google Scholar
Cross Ref
- [38] . 2008. Aesthetics and credibility in web site design. Information Processing & Management 44, 1 (2008), 386–399.Google Scholar
Digital Library
- [39] . 2007. The emperor’s new security indicators. In 2007 IEEE Symposium on Security and Privacy (SP’07). IEEE, New York, NY, USA, 51–65.Google Scholar
Digital Library
- [40] . 1965. An analysis of variance test for normality (complete samples). Biometrika 52, 3/4 (1965), 591–611.Google Scholar
Cross Ref
- [41] 2016. All Shopify Stores Now Use SSL Encryption Everywhere. https://www.shopify.ca/blog/73511365-all-shopify-stores-now-use-ssl-encryption-everywhere.Google Scholar
- [42] . 2004. Packaging and purchase decisions: An exploratory study on the impact of involvement level and time pressure. British Food Journal 106, 8 (2004), 607–628.Google Scholar
Cross Ref
- [43] . 2011. Shape and significance of feminine beauty: An evolutionary perspective. Sex Roles 64, 9-10 (2011), 723–731.Google Scholar
Cross Ref
- [44] . 2016. Your Reputation Precedes You: The Influence of Expectations on Usability and Visual Appeal in a Web Environment. Ph. D. Dissertation. Swinburne University of Technology. https://researchbank.swinburne.edu.au/items/e3230536-2ac5-4b92-a11d-8c47b65ab353/1/.Google Scholar
- [45] . 2018. Who are they? Website authentication: Certificates and identity. In Who Are You? Adventures in Authentication Workshop (WAY’18). 1–5. https://wayworkshop.org/2018/papers/way2018-stojmenovic.pdf.Google Scholar
- [46] . 2016. Does textual word-of-mouth affect look and feel? In Proceedings of the 28th Australian Conference on Computer-Human Interaction (Launceston, Tasmania, Australia) (
OzCHI’16 ). ACM, New York, NY, USA, 257–265.DOI: Google ScholarDigital Library
- [47] . 2018. Building website certificate mental models. In Persuasive Technology, , , , and (Eds.). Springer International Publishing, Cham, 242–254.
DOI: Google ScholarCross Ref
- [48] . 2019. Website identity notification: Testing the simplest thing that could possibly work. In 2019 17th International Conference on Privacy, Security and Trust (PST). IEEE, New York, NY, USA, 1–7.
DOI: Google ScholarCross Ref
- [49] . 2013. Users’ perception towards usability and aesthetics design of travel websites. In Proceedings of The International Conference on E-Commerce and Information Technology, Vol. 117.Google Scholar
- [50] . 2019. The web’s identity crisis: Understanding the effectiveness of website identity indicators. In 28th USENIX Security Symposium (USENIX Security 19). USENIX, Berkeley, CA, USA, 1715–1732.Google Scholar
- [51] . 2007. Usability, aesthetics and emotions in human–technology interaction. International Journal of Psychology 42, 4 (2007), 253–264.
DOI: arXiv:Google ScholarCross Ref
- [52] . 1997. Aesthetics and apparent usability: Empirically assessing cultural and methodological issues. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, 115–122.Google Scholar
Digital Library
- [53] . 2000. What is beautiful is usable. Interacting with Computers 13, 2 (2000), 127–145.
DOI: Google ScholarCross Ref
- [54] . 2012. Is beautiful really usable? Toward understanding the relation between usability, aesthetics, and affect in HCI. Computers in Human Behavior 28, 5 (2012), 1596–1607.Google Scholar
Digital Library
- [55] . 1972. Elimination by aspects: A theory of choice. Psychological Review 79, 4 (1972), 281.Google Scholar
Cross Ref
- [56] . 2009. The role of context in perceptions of the aesthetics of web pages over time. International Journal of Human-Computer Studies 67, 1 (2009), 79–89.Google Scholar
Digital Library
- [57] . 1992. Ecological interface design: Theoretical foundations. IEEE Transactions on Systems, Man, and Cybernetics 22, 4 (
7 1992), 589–606.DOI: Google ScholarCross Ref
- [58] . 2020. User Agent Breakdowns. WikiMedia Foundation. Retrieved July 21, 2020 from https://analytics.wikimedia.org/dashboards/browsers/#all-sites-by-browser.Google Scholar
- [59] . 1987. The halo effect in store image measurement. Journal of the Academy of Marketing Science 15, 3 (1987), 44–51.Google Scholar
Cross Ref
- [60] . 2006. Do security toolbars actually prevent phishing attacks? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, 601–610.Google Scholar
Digital Library
- [61] . 1994. The impact of product aesthetics on the evaluation of industrial products. Journal of Product Innovation Management 11, 4 (1994), 309–324.
DOI: Google ScholarCross Ref
Index Terms
What is Beautiful is Secure
Recommendations
The negative impact of saturation on website trustworthiness and appeal: A temporal model of aesthetic website perception
AbstractPrevious research on the perception of websites has shown that users' impressions of websites generated in ultra-rapid display durations (50 ms) correlate with their assessment after longer display durations. Based on the importance of ...
Highlights- Participant assessed saturated or desaturated versions of 50 websites (10 content domains).
Are first impressions about websites only related to visual appeal?
INTERACT'11: Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IThis paper investigates whether immediate impression about websites influences only perceptions of attractiveness. The evaluative constructs of perceived usability, credibility and novelty were investigated alongside visual appeal in an experimental ...
Perceived and objective usability and visual appeal in a website domain with a less developed mental model
OzCHI '14: Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures: the Future of DesignIn Human-Computer Interaction (HCI), the usability and aesthetics of webpages have been studied extensively. However, research into participant experience and expertise with the website domain being studied is often overlooked. This paper strived to ...






Comments