Principles are based on scientific sources.
Name | Reciprocity |
Sources | (Chiasson et al., 2007) (Stobert et al., 2007) |
Synonyms | None |
Intent | Harnessing the human tendency to return favors. |
Motivation | The
norm
of
reciprocity
is
at
work
when
people
respond
with
similar
kinds
of
behaviour
to
that
which
they
are
shown.
Positive
overtures
usually
lead
to
cooperation
with
others
. However,
rudeness
and
unhelpfulness
can
also
lead
people
to
behave
similarly
in
response.
People respond reciprocally to computers , so a security program should make it obvious that it is helping its users. |
Examples | None |
Guidelines | None |
Tags | None |
Log history | [02/14/2016]: Added to repository [04/22/2016]: Deleted “Principle of” |
Chiasson, S., Biddle, R., Somayaji, A., 2007. Even Experts Deserve Usable Security: Design guidelines for security management systems, in:.
Stobert, E., Chiasson, S., Biddle, R., 2007. Persuasion, Social Graces, and Computer Security.