A Systematic Review of Security Communication Strategies: Guidelines and Open Challenges

📅 2025-04-02
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study addresses core challenges in cybersecurity communication—including information overload, opaque technical terminology, risk-induced anxiety, and the security–comfort paradox—through a systematic literature review (SLR) encompassing over 3,400 publications, augmented by qualitative thematic analysis and cross-population comparison. It identifies critical research gaps for underrepresented groups (e.g., older adults, children, and non-U.S. populations), insufficient longitudinal designs, and poor protocol transparency. Based on empirical evidence, the work proposes seven evidence-based guidelines for effective security communication and introduces the first user-centered, customizable security notification framework. This framework enables adaptive notification strategies tailored to cultural context, age, and cognitive profile, thereby enhancing comprehension and trustworthiness while significantly reducing user anxiety and improving response rates.

Technology Category

Application Category

📝 Abstract
Cybersecurity incidents such as data breaches have become increasingly common, affecting millions of users and organizations worldwide. The complexity of cybersecurity threats challenges the effectiveness of existing security communication strategies. Through a systematic review of over 3,400 papers, we identify specific user difficulties including information overload, technical jargon comprehension, and balancing security awareness with comfort. Our findings reveal consistent communication paradoxes: users require technical details for credibility yet struggle with jargon and need risk awareness without experiencing anxiety. We propose seven evidence-based guidelines to improve security communication and identify critical research gaps including limited studies with older adults, children, and non-US populations, insufficient longitudinal research, and limited protocol sharing for reproducibility. Our guidelines emphasize user-centric communication adapted to cultural and demographic differences while ensuring security advice remains actionable. This work contributes to more effective security communication practices that enable users to recognize and respond to cybersecurity threats appropriately.
Problem

Research questions and friction points this paper is trying to address.

Evaluating effectiveness of current security communication strategies
Addressing user difficulties like information overload and jargon
Identifying research gaps in diverse populations and reproducibility
Innovation

Methods, ideas, or system contributions that make the work stand out.

Systematic review of 3,400 papers
Seven evidence-based communication guidelines
User-centric cultural adaptation approach
🔎 Similar Papers
No similar papers found.
C
Caroline Carreira
Carnegie Mellon University, IST University of Lisbon and INESC-ID, Lisbon, Portugal
A
A. Mendes
INESC TEC, Faculty of Engineering, University of Porto, Porto, Portugal
J
Joao F. Ferreira
INESC-ID and IST, University of Lisbon, Lisbon, Portugal
Nicolas Christin
Nicolas Christin
Carnegie Mellon University
Computer SecurityComputer NetworksSecuritySocietal ComputingTechnology Policy