communication enhancement could be applicable to 
almost any area. For example, in phishing attacks via 
email, the warning message could be displayed by the 
operating system when certain patterns are detected 
in the email content. Obviously, one drawback to this 
approach is that the number of warning messages 
could significantly increase, and finding the right 
balance could be another challenge to face. 
Ultimately, we do not want to sacrifice security to 
jeopardize the user’s experience.  
4.3  Limitations and Future Research 
Our study has several limitations. Firstly, we were 
unable to identify the users who downloaded the 
application. This limits our findings as a better 
understanding of who they are, their technical skills, 
experience, etc. could bring more precision to the 
results. We suggest that future studies might 
incorporate this aspect and attempt to understand how 
people’s background, cultural aspects, etc. affect their 
overall software use. Secondly, we used an online 
open-source repository to place our application. 
While many of these repositories are labeled as 
trusted, often they are limited to medium to advanced 
users, as novice users do not have sufficient technical 
skills to use these websites. This could have some 
limitations in terms of the results as it could be 
expected that novice users would be more inclined to 
abandon their software use immediately rather than 
continuing. Overall, we suggest that future studies 
should build on the restrictive deterrence theory and 
use the C-HIP model to further theorize how different 
aspects of the C-HIP model interact with the 
restrictive deterrence premises. It could be 
interesting, for instance, to understand how attention 
and comprehension are related to the frequency of 
repeated software use. 
5 CONCLUSIONS 
The effectiveness of warnings in influencing users’ 
behaviors when using low-trust (potentially 
malicious) software has not been adequately 
addressed by prior research. This study represents a 
first attempt to illustrate the way in which warnings 
can reduce the frequency and the duration of low-trust 
software use. These results are particularly interesting 
for IT managers as they suggest that the use of non-
approved software could be reduced in frequency, or 
completely abandoned, in the presence of warning 
messages, so that security incidents could be better 
mitigated and reduced. 
REFERENCES 
Akhawe, D. and Felt, A. P. (2013) Usenix Security. 
Andrews, J. C. (2011) 'Warnings and disclosures', 
Communicating Risks and Benefits: An Evidence-Based 
User's Guide, pp. 149-61. 
Beauregard, E. and Bouchard, M. (2010) 'Cleaning up your 
act: Forensic awareness as a detection avoidance 
strategy', Journal of Criminal Justice, 38(6), pp. 1160-
1166. 
Blais, E. and Bacher, J.-L. (2007) 'Situational deterrence 
and claim padding: Results from a randomized field 
experiment',  Journal of Experimental Criminology, 
3(4), pp. 337-352. 
Box-Steffensmeier, J. M. and Jones, B. S. (2004) Event 
history modeling: A guide for social scientists. 
Cambridge University Press. 
Bravo-Lillo, C., Cranor, L. F., Downs, J., Komanduri, S., 
Reeder, R. W., Schechter, S. and Sleeper, M. (2013) 
SOUPS '13 Proceedings of the Ninth Symposium on 
Usable Privacy and Security. 
Bushman, B. J. (2006) 'Effects of warning and information 
labels on attraction to television violence in viewers of 
different ages', Journal of Applied Social Psychology, 
36(9), pp. 2073-2078. 
Camp, L. J. (2006) 'Mental models of privacy and security', 
Available at SSRN 922735. 
Chen, T.-C., Stepan, T., Dick, S. and Miller, J. (2014) 'An 
anti-phishing system employing diffused information', 
ACM Transactions on Information and System Security 
(TISSEC), 16(4), p. 16. 
Conzola, V. C. and Wogalter, M. S. (2001) 'A 
Communication-Human Information Processing (C-
HIP) approach to warning effectiveness in the 
workplace',  Journal of Risk Research, 4(4), pp. 309-
322. 
Cranor, L. F. (2008) 'A Framework for Reasoning About 
the Human in the Loop', UPSEC, 8, pp. 1-15. 
Egilman, D. and Bohme, S. (2006) 'A brief history of 
warnings', Handbook of Warnings. Lawrence Erlbaum 
Associates, Mahwah, NJ, pp. 35-48. 
Gallupe, O., Bouchard, M. and Caulkins, J. P. (2011) 'No 
change is a good change? Restrictive deterrence in 
illegal drug markets', Journal of Criminal Justice, 
39(1), pp. 81-89. 
Gibbs, J. P. (1975) Crime, punishment, and deterrence. 
Elsevier New York. 
Grier, C., Tang, S. and King, S. T. (2008) Security and 
Privacy, 2008. SP 2008. IEEE Symposium on. IEEE. 
Jacobs, B. A. (1996) 'Crack dealers' apprehension 
avoidance techniques: A case of restrictive deterrence', 
Justice Quarterly, 13(3), pp. 359-381. 
Jacobs, B. A. (2010) 'DETERRENCE AND 
DETERRABILITY*',  Criminology, 48(2), pp. 417-
441. 
Jacobs, B. A. and Cherbonneau, M. (2014) 'Auto theft and 
restrictive deterrence', Justice quarterly, 31(2), pp. 344-
367. 
Kaplan, E. L. and Meier, P. (1958) 'Nonparametric 
estimation from incomplete observations', 
Journal of