Skip to main content

ORIGINAL RESEARCH article

Front. Psychol., 07 December 2020
Sec. Cognition
This article is part of the Research Topic Cognition, Behavior and Cybersecurity View all 16 articles

Repetition of Computer Security Warnings Results in Differential Repetition Suppression Effects as Revealed With Functional MRI

\r\nC. Brock Kirwan,*C. Brock Kirwan1,2*Daniel K. BjornnDaniel K. Bjornn2Bonnie Brinton AndersonBonnie Brinton Anderson3Anthony VanceAnthony Vance4David EargleDavid Eargle5Jeffrey L. JenkinsJeffrey L. Jenkins3
  • 1Neuroscience Center, Brigham Young University, Provo, UT, United States
  • 2Department of Psychology, Brigham Young University, Provo, UT, United States
  • 3Department of Information Systems, Brigham Young University, Provo, UT, United States
  • 4Department of Management Information Systems, Fox School of Business, Temple University, Philadelphia, PA, United States
  • 5Leeds School of Business, University of Colorado Boulder, Boulder, CO, United States

Computer users are often the last line of defense in computer security. However, with repeated exposures to system messages and computer security warnings, neural and behavioral responses show evidence of habituation. Habituation has been demonstrated at a neural level as repetition suppression where responses are attenuated with subsequent repetitions. In the brain, repetition suppression to visual stimuli has been demonstrated in multiple cortical areas, including the occipital lobe and medial temporal lobe. Prior research into the repetition suppression effect has generally focused on a single repetition and has not examined the pattern of signal suppression with repeated exposures. We used complex, everyday stimuli, in the form of images of computer programs or security warning messages, to examine the repetition suppression effect across repeated exposures. The use of computer warnings as stimuli also allowed us to examine the activation of learned fearful stimuli. We observed widespread linear decreases in activation with repeated exposures, suggesting that repetition suppression continues after the first repetition. Further, we found greater activation for warning messages compared to neutral images in the anterior insula, pre-supplemental motor area, and inferior frontal gyrus, suggesting differential processing of security warning messages. However, the repetition suppression effect was similar in these regions for both warning messages and neutral images. Additionally, we observed an increase of activation in the default mode network with repeated exposures, suggestive of increased mind wandering with continuing habituation.

Introduction

One major obstacle to computer security is habituation on the part of computer users to repeated computer security messages. Sometimes termed “warning fatigue,” this habituation to security warnings can result in lower rates of security behavior (Akhawe and Felt, 2013). At a biological level, repeated exposure to a stimulus results in repetition suppression, or a decreased neuronal response to that stimulus. Evidence for repetition suppression has been observed for both auditory (Costa-Faidella et al., 2011; Todorovic et al., 2011) and visual processing (Summerfield et al., 2008, 2011; Larsson and Smith, 2012) using recording methods including single-unit recording electrophysiology (Malmierca et al., 2009), functional magnetic resonance imaging (fMRI) (Larsson and Smith, 2012; Grotheer and Gyula, 2015), electroencephalography (Costa-Faidella et al., 2011; Summerfield et al., 2011), and magnetoencephalography (Todorovic et al., 2011; Todorovic and de Lange, 2012).

The effect of habituation has been studied in different ways in different fields. For example, in marketing, a great deal of research has studied “repetition effects” (Schmidt and Eisend, 2015), or the “differential effects of each successive advertising exposure, i.e., the differential effects of a given exposure within a sequence of exposures” (Pechmann and Stewart, 1988, p. 287). The most accepted theory explaining repetition effects is Berlyne’s (1970) two-factor theory that explains a “wear-in” process in which familiarity and ad effectiveness increases with repetitions, and a later “wear-out” process, in which the effectiveness of an advertisement decreases with each succeeding exposure.

In contrast, in the fields of warning science and computer security, repeated exposure to a warning does not lead to beneficial familiarity effects, but leads directly to diminished attention to a warning (Wogalter and Vigilante, 2006; Vance et al., 2017). In computer security, habituation to warnings has been frequently inferred as a factor without measuring it directly (Bravo-Lillo et al., 2014). For example, Akhawe and Felt (2013, p. 268) reported that the most common web browser SSL error had the lowest adherence rate, which they concluded was “indicative of warning fatigue.” However, some studies have examined habituation directly by measuring decreased attention to warnings using eye-tracking, mouse cursor tracking, and fMRI (Anderson et al., 2016a,b; Vance et al., 2018). The results from all of these studies show decrease attention to warnings after only 2–3 exposure. However, none of these studies directly compared how people habituate to computer security warning stimuli compared to general software application stimuli, a gap that this article investigates.

The underlying process of repetition suppression is not fully known and there is some debate as to the mechanisms that achieve the decrease in neuronal activation. One view is the bottom-up, or fatigue model, which suggests that differences in activity are related to the refractory period of local neural generators in response to physical stimulation (see Grill-Spector et al., 2006, for review). Another view is the top-down, or predictive coding, model which posits that repetition suppression is due to the expected probability of a stimulus recurring (Mayrhauser et al., 2014). Recent research gives support for the predictive coding model; Summerfield et al. (2008) found that the repetition suppression effect was modulated by an expectation of how often stimuli would repeat. Larsson and Smith (2012) also found that expectation can influence the repetition suppression effect, but only when one is actively attending to the repeated stimulus. Valentini (2011), however, observes that there is evidence for some contribution by both bottom-up and top-down processes in repetition suppression.

The response to repeated stimulus exposure is not uniform across the brain and may depend on context or task demands. Multiple areas in the occipital and temporal lobes demonstrate a repetition suppression effect (Kovacs et al., 2013; Mayrhauser et al., 2014). Structures in the medial temporal lobe (MTL) including the hippocampus also demonstrate decreased fMRI activation in response to repeated stimuli, sometimes referred to as a novelty response (Stern et al., 1996). On the other hand, other regions of the MTL demonstrate an increase in fMRI activation in response to repeated stimuli (Kirwan et al., 2009), referred to as a familiarity response (e.g., Daselaar et al., 2006). In a review of the repetition enhancement effect (increased fMRI activation with stimulus repetition), Segaert et al. (2013) identified several factors that influence whether repetition suppression or repetition enhancement is observed. These factors include task demands and cognitive processes engaged (including memory, learning, and attention). Further, regions in the default mode network (DMN), including the medial parietal lobe, inferior parietal lobule, and prefrontal cortex, also demonstrate an increase in fMRI activation with repeated stimulus exposure (Danckert et al., 2007; McDonald et al., 2010). This increase in DMN activation has been linked to inattention to a specific stimulus (Mason et al., 2007; Raichle and Snyder, 2007) as demonstrated by decreased subsequent recognition memory accuracy (Shrager et al., 2008). Based on these findings, it is reasonable to assume that repeated exposure to a stimulus will result in decreased activation in sensory and attention networks and increased activation in the DMN.

Studies of repetition suppression typically use only a few repetitions over a short period of time typically lasting only a few minutes (Chouinard et al., 2008; Summerfield et al., 2008, 2011). Further, while some studies of novelty and familiarity effects have demonstrated both effects in different regions of the MTL within the same paradigm (notably in the hippocampus; e.g., Daselaar et al., 2006), none have examined the longer-term trade-off between novelty and familiarity signaling in the same region within the same paradigm. Thus, it is unclear if these repetition suppression effects (i.e., decreases in fMRI activation) would continue with repeated exposures to the same stimulus in the same scanning session.

Another limitation of the current repetition suppression effect literature is that generally simple stimuli have been studied, such as tones (Costa-Faidella et al., 2011; Todorovic et al., 2011; Todorovic and de Lange, 2012) or single objects (Chouinard et al., 2008; Kovacs et al., 2013). More complex visual stimuli, such as faces, have been used as well (Summerfield et al., 2008, 2011; Larsson and Smith, 2012). However, it is not known how repetition applies to complex, everyday stimuli such as images of computer programs over repeated exposures, much like what is experienced during everyday computer use. Accordingly, images of common computer scenes provide a real-world application for the phenomenon of repetition suppression. Further, computer security warning messages have a learned, negative emotional content. Thus, the use of computer warning messages provides the opportunity to examine the effect of learned emotional stimuli in a more realistic setting.

Computer security warnings are not inherently aversive stimuli and thus any negative emotional valence associated with them must be learned, likely through social or verbal means. While much is known about the neural circuitry involved in classical fear conditioning, relatively little is known about the neural circuitry of social fear learning (Olsson and Phelps, 2007). Classical fear conditioning is critically dependent on the amygdala (Phillips and LeDoux, 1992) and has been shown to activate amygdala in human neuroimaging paradigms (Buchel and Dolan, 2000). Similarly, social and verbal fear learning have been shown to activate the amygdala (e.g., Phelps et al., 2001), indicating a general role of the amygdala in fear acquisition and fear expression in both classically conditioned and socially or verbally acquired fear responses. The anterior insula is also activated for verbally acquired fear representations (Phelps et al., 2001; Olsson and Phelps, 2007). Anterior insula activity has been linked to the anticipation of negative events (Grupe and Nitschke, 2013) and its dysfunction has been linked to avoidance of threat uncertainty (Paulus and Stein, 2006). Anterior insula activation has also been associated with general arousal levels, regardless of positive or negative valence of the stimulus (Knutson et al., 2014).

In the current experiment, we sought to examine the repetition suppression effect over repeated exposures to complex, everyday stimuli both generally and for socially constructed fearful stimuli. We anticipated a repetition suppression effect (i.e., decreased BOLD signal) in visual processing stream but increased activation in DMN regions with repeated exposures. We further examined the effect of repeated exposures on novelty and familiarity signals in the MTL. Finally, we investigated the effects of repetition on responses of brain regions associated with fear and/or arousal.

Materials and Methods

Subjects

Twenty-two participants (4 female, 18 male; 24 years old, range 20–27) were recruited from the university community and gave written informed consent prior to participation. The sample size was determined by previous literature in this area (Dimoka, 2012) and guidelines set forth by Desmond and Glover (2002) to calculate the required number of subjects to ensure adequate statistical power. Participants were right-handed native English speakers with normal or corrected-normal visual acuity. Participants self-reported free of psychiatric or neurological conditions. As members of the university community, these subjects had a high level of computer literacy. The experiment was approved by the University Institutional Review Board and was conducted in accordance with the principles of the Declaration of Helsinki. Participants were compensated US $25 for a 60 min session.

Behavioral Task

We used an event-related, within-subject experimental design in which participants viewed a random sequence of 60 images of general software application screenshots (such as Microsoft Word, Excel, and other common applications) and security warnings collected by the researchers (Figure 1). The experiment utilized a variety of actual security warnings from programs running on a Windows operating system. Table 1 summarizes each type of warning.

FIGURE 1
www.frontiersin.org

Figure 1. Example stimuli from the behavioral experiment. Participants viewed repetitions of general software images (left) and computer security warnings (right) in a randomized order.

TABLE 1
www.frontiersin.org

Table 1. Description of warnings shown to participants.

For visual consistency, all images of general software applications and security warnings were for the Windows operating system. Our experimental design is graphically depicted in Figure 2 and consisted of two steps for each participant. In Step 1, images were organized into three sets of 20 images each. The first two sets comprised security warnings and general software applications. These were repeated six times each in random order across the duration of the scan. A third set consisted of general software application images, which were each displayed only once during the scan. This was done to create a baseline of unique presentations throughout the task. Thus, there were 260 total images (20 warnings × 6 repetitions + 20 software images × 6 repetitions + 20 software images × 1 exposure each) displayed in the experiment. In Step 2, the 260 images were randomized for each participant across two blocks of 7.7 min each (with a ∼2 min break in between).

FIGURE 2
www.frontiersin.org

Figure 2. Randomization and behavioral task scheme. Computer security warning and general software images were displayed in two blocks of 130 images in random order. Twenty security warnings and 20 general software images were displayed six times each while 20 additional general software images were displayed once only.

Subjects were given a verbal briefing about the MRI procedures and the task, and then situated supine in the MRI scanner. Visual stimuli were displayed using E-prime software (version 2.0.10) and were viewed by means of a mirror attached to the head coil reflecting a large monitor outside the scanner. On each trial, images were displayed for 3 s each, with a 0.5 s inter-stimulus interval (ISI).

In order to keep participants attentive during the viewing of images, they were instructed to use an MR-compatible keypad to indicate if the image shown was common or uncommon in their experience. We intentionally used a simple task in order to minimize influence on the repetition suppression effect, while still enabling measurement of participant attention to the task. Such an approach is common in pattern separation tasks, for example, where the repetition suppression effect is used to differentiate repeated images from similar lures (Lacy et al., 2011). Participants responded on 96% of trials (SD = 10%), indicating that they were appropriately engaged and on task. At the end of the experimental task, participants were debriefed, compensated, and dismissed.

Equipment and Scan Parameters

MRI scanning took place on a Siemens 3T Trio scanner. For each scanned subject, we collected a high-resolution structural MRI scan for functional localization in addition to the two functional scans. Structural images were acquired with a T1-weighted magnetization-prepared rapid acquisition with gradient echo (MP-RAGE) sequence with the following parameters: TE = 2.26 ms, flip angle = 9°, slices = 176, slice thickness = 1.0 mm, matrix size = 256 × 215, voxel size = 1 mm × 0.98 mm × 0.98 mm. Functional scans were acquired with a gradient-echo, echo-planar, T2-weighted pulse sequence with the following parameters: TR = 2,000 ms, TE = 28 ms, flip angle = 90°, slices = 40, slice thickness = 4.0 mm (no skip), matrix size = 64 × 64, voxel size = 3.44 mm × 3.44 mm × 3 mm. All data are available at https://openneuro.org/datasets/ds002363 and data analysis scripts are available at https://github.com/Kirwanlab/RepetitionSuppression.

Analysis

MRI data were analyzed with the Analysis of Functional Images (AFNI) suite of programs (Cox, 1996). Briefly, structural and functional scans were converted to NIfTI file format using dcm2niix1 (Li et al., 2016) which performs slice time correction of functional scans as part of the conversion process. Motion correction of the functional runs was calculated based on the volume with the least amount of noise for each functional run. Spatial normalization was calculated for each T1-weighted structural scan to MNI space. The motion correction and spatial normalization transformations were concatenated so that functional data underwent a single interpolation, thus reducing blurring of the data in preprocessing (Muncy et al., 2017). Functional data were scaled by the mean signal intensity. An intersection mask was calculated based on the overlap of the extent of coverage of the T2-weighted functional scans and a gray matter mask of the MNI template brain. All group analyses were performed within this intersection mask.

For the first-level regression analysis, behavioral vectors were created that coded for stimulus type (e.g., security warnings, general software application screenshots) and repetition number. Additionally, we included a regressor for the single-presentation general computing screenshots to serve as a stimulus check to ensure that any observed decreases in responding were not due to fatigue. Stimulus events were modeled using a 3 s boxcar function convolved with the canonical hemodynamic response. Regressors coding for motion (6 regressors per scan run) and polynomial regressors coding for scan run and scanner drift were also entered into the model as nuisance variables. To control for size differences between the general software application screenshots and security warnings, the total size of each stimulus (in pixels) was also entered as a nuisance variable. Resulting beta values were blurred with a 5 mm FWHM Gaussian kernel. Beta values for the conditions of interest were then entered into the group-level analysis, which consisted of a model with stimulus type (two levels) and repetition number (six levels) as within-subject factors. The residuals from the first-level regression analysis were also blurred with a 5 mm FWHM Gaussian kernel and used to estimate the smoothness of each functional scan. This smoothness estimate was then entered into Monte Carlo simulations to determine a spatial extent threshold for performing corrections for multiple comparisons in group-level analyses (Cox et al., 2017). All tests were corrected for multiple comparisons using a voxel-wise threshold of p < 0.001 and a spatial extent threshold of 12 voxels, nearest-neighbors level 2 (overall p < 0.01).

Results

As our hypotheses concerned differential responses over repeated exposures to stimuli, we first identified clusters that showed a main effect of repetition. Fifteen clusters survived correction for multiple comparison: left and right dorsal and ventral visual processing streams, left and right inferior frontal gyrus (with a separate cluster in right anterior inferior frontal gyrus), bilateral presupplementary motor area (pre-SMA), bilateral retrosplenial cortex, left and right premotor cortex, left superior temporal sulcus, left intraparietal sulcus (IPS), right anterior insula, right posterior cingulate cortex (PCC), and right precuneus (see Table 2 for MNI coordinates and statistics and Figure 3 for locations and responses). Average betas for each of the stimulus type and repetition conditions were extracted from these clusters and subjected to follow-up analyses (repeated-measures ANOVAs and linear contrasts). The follow-up analysis revealed a significant linear trend of repetition (collapsing over stimulus type) in each of the clusters (p’s < 0.01), consistent with our hypotheses of sustained effects across numerous repetitions. All linear trends were negative except for the PCC and precuneus (see Figure 3, right panel). There was a main effect of stimulus type with greater activation for general software screenshots than security warnings (i.e., Business > Warning) in the left and right visual stream (dorsal and ventral), and the retrosplenial cortex (Table 2). The opposite effect (i.e., Warning > Business) was observed in clusters in the left inferior frontal gyrus, the pre-SMA, and the right anterior insula. The stimulus type by repetition number interaction was not significant in any cluster. Finally, there was a stimulus type by repetition number interaction in the linear trends in the left and right (dorsal) visual processing streams (Table 2).

TABLE 2
www.frontiersin.org

Table 2. Location and description of significant clusters showing a main effect of repetition.

FIGURE 3
www.frontiersin.org

Figure 3. Significant clusters of activation demonstrating a main effect of repetition number displayed on axial slices (left). Regions with negative linear trends are indicated in cooler colors (blue) while regions with positive linear trends are indicated in warmer colors (yellow/orange). Mean betas for the general software and security warning conditions over six repetitions within each cluster are displayed on the right. Posterior clusters in the visual processing streams, and retrosplenial cortex displayed a main effect of stimulus type with greater activation for the general software images than security warnings. More anterior regions including the left inferior frontal gyrus, the pre-SMA, and the right anterior insula displayed a main effect of stimulus type with greater activation for security warnings than general software images. The linear trend was significant in all clusters, however only the PCC and precuneus displayed a positive trend. Activation for the single-presentation general computing screenshots was significantly different from the final presentation of the repeated images in each cluster for both conditions with the exception of the Warning stimuli in the right anterior insula. Error bars, SEM.

The reduced activation with repeated exposures to stimuli may have represented participant failure to respond to stimuli or overall fatigue. As the behavioral orienting task was a subjective judgment, we were not able to calculate an accuracy rate to determine if accuracy decreased with the duration of the task. Nevertheless, response rates remained high (>94%) throughout the course of the task. As a check for overall fatigue, we modeled the single-presentation general computing screenshots. If the observed decreases in activation were due to overall fatigue, the effect should generalize to the novel stimuli as well. In all clusters of activation the activity for the novel stimuli was greater than for the final presentation of either the general computing or warning stimuli (Figure 3), with the sole exception of the warning stimuli in the right anterior insula.

The sustained negative linear trends in the majority of clusters of activation are consistent with habituation processes. Conversely, activation in the right precuneus increased with repeated exposures to the stimuli. The precuneus is a hub of the default mode network (DMN; Raichle, 2015), which is a network of brain structures that become more active as participants engage less in a primary task (Mason et al., 2007). To test whether the increasing activation observed in the precuneus represented DMN activation, we conducted a similarity analysis by extracting the mean betas for each condition in the precuneus cluster and calculating a correlation with this pattern of activation across every voxel in the brain. Correlation coefficients were Fisher transformed and a t-test was performed on these values versus 0 to identify regions where activation was significantly correlated with that of the precuneus. Five clusters were identified: the precuneus, posterior cingulate cortex, right temporal parietal junction, medial prefrontal cortex, and right frontopolar cortex (Figure 4 and Table 3). As these regions are commonly associated with the DMN (Raichle, 2015), we conclude that the increasing activation with stimulus repetition observed in the precuneus likely reflects increased DMN activation.

FIGURE 4
www.frontiersin.org

Figure 4. Clusters where activation was significantly correlated with the precuneus in a representational similarity analysis (RSA) included the precuneus, the posterior cingulate cortex, the right temporal parietal junction, the medial prefrontal cortex, and the right frontopolar cortex.

TABLE 3
www.frontiersin.org

Table 3. Clusters significantly correlated with activation in the precuneus.

Discussion

In the current experiment, participants viewed repeated images of software applications and security warnings while they underwent fMRI. We found evidence of repetition suppression for both stimulus types throughout the visual processing stream. Critically, fMRI activation continued to decrease over all six repetitions of the stimuli, indicating a continued repetition suppression effect with continued stimulus exposures. Conversely, we observed increased activation in DMN regions with repeated exposures. Finally, we observed increased activation in frontal regions including the pre-SMA, inferior frontal gyrus, and anterior insula for security warning stimuli compared to general software applications, consistent with heightened negative subjective value for the warning stimuli. These findings indicate that repetition suppression is multifaceted, differentially affecting a variety of areas.

We first examined the repetition suppression effect to everyday stimuli. We observed distinct patterns of activation over the course of repetitions. Similar to previous studies, there was a decrease of activation in areas related to visual processing, namely in the occipital lobe (Kovacs et al., 2013; Mayrhauser et al., 2014) and inferior temporal lobe (Summerfield et al., 2008). Adding to this previous work, we observed a continued, linear decrease in activation through all six repetitions. Such a finding shows that the decrease of activation in these areas does not level off after the second trial but continues to decrease with prolonged exposure to the stimulus. This repetition suppression occurred in frontal regions as well and applied to both images of general computing software and security warnings, indicating that the learned negative valence of computer security warnings is not enough to overcome habituation.

Along with the decreased activation in the occipital and inferior temporal lobes with repeated presentations, we also observed increased activation in the DMN, namely the precuneus and PCC. Activation in the DMN has been demonstrated to be negatively correlated with activation in a network of regions known to be involved in directing external attention, the dorsal attention network (Fox et al., 2005). Thus, increased activation in the DMN is often associated with unconstrained mental activity (“mind wandering”) (Mason et al., 2007; Raichle and Snyder, 2007). The continued increased activation in the DMN during subsequent stimulus presentations suggests that the participants were less attentive to the stimuli as the repetitions increased.

Because we used naturalistic stimuli with learned negative valence, we were able to examine the differential response to positive and negative valance images over several repetitions. We observed greater activation for general software stimuli than the warning stimuli in posterior regions including the bilateral visual stream and retrosplenial cortex. The general software images were on average larger (general software mean image dimensions: 760.8 × 1,173.4 pixels; warning mean image dimensions: 381.9 × 589.4 pixels), which might have accounted for some of the greater activation in the visual processing stream. To control for this, we entered stimulus size on each trial as a nuisance regressor in the first-level regression analysis. In spite of this control, we nevertheless observed widespread activation differences between stimulus types in the visual processing streams. This could be explained by elements of the images as the general software stimuli contained images used for work and recreation providing various uses, options, and tools. In contrast, the security warnings were less captivating with a lack of information and visual stimuli within the image. In spite of this, the linear trend interaction between stimulus types in the visual processing streams and intraparietal sulcus indicates that any additional visual or attentional processing afforded the general computing images habituated faster (i.e., had a steeper negative linear trend) than security warnings.

For areas including inferior frontal gyrus, pre-SMA, and right anterior insula, there was a greater level of activation for the computer warning stimuli than the general software images. The anterior insula has been specifically associated with anxiety and fear conditioning (Grupe and Nitschke, 2013) and has been implicated in initiating a fear response as a result from negative or harmful stimuli (Knutson et al., 2014). The greater activation for computer warning stimuli as opposed to general software images in this region is consistent with a fear response to the warning stimuli over the general software stimuli. An anterior insula-mediated fear response functions not only for environmental risk, but also for safety from other negative experiences and stimuli (Knutson et al., 2014). Additionally, the anterior insula response was still activated even though the computer warning stimuli was fictitious. The participant was informed before participation that the computer warnings were mock images and not directly related to them or their property. This is consistent with other studies that have shown that fear response is still activated even when not part of the primary task (Carlsson et al., 2004).

Some limitations should be noted in the present study. First, while we examined the repetition suppression effect with complex stimuli, we looked at these stimuli with repeated repetitions within a short period of time. The use of complex stimuli adds to the external validity of the study, but computer security warnings are generally observed infrequently over longer periods of time (days or weeks). A longitudinal study looking at how extended exposure over several weeks could add to the findings of this study by presenting these stimuli in a more natural time course. Second, computer security warnings are a familiar sight among individuals who regularly use computers. Further, we did not assess the pre-experimental familiarity of the stimuli in this group of participants. Therefore, these stimuli may not have been completely novel. Regardless, we still found a strong repetition suppression effect even when the participants had encountered similar stimuli previously in everyday use of computers. This suggests a potential line of research examining the extent to which habituation generalizes from non-security messages to computer security warnings. In other words, future studies may wish to examine whether participants habituate to innocuous system notifications (such as email notifications) and whether that habituation generalizes to security warnings. Third, we do not determine the number of repetitions where activation begins to level off. While other research shows that the greatest decrease in activation occurs during early repeated exposures to stimuli to complex (Anderson et al., 2016a,b; Vance et al., 2018), future research is needed to determine at what point additional repetitions do not cause a meaningful decrease in activation. Finally, we did not collect valance ratings or physiological arousal measurements associated with the warning stimuli. However, previous studies (e.g., Buck et al., 2017) have demonstrated negative valance associated with pop-up security warnings.

One strength of this study is that it examined the repetition suppression effect in complex, everyday stimuli as well as examining this phenomenon with extended repetitions. This design allowed us to replicate and confirm previous findings of earlier research that visual processing activation decreases over repetition as well as DMN activation increases over repetition. Along with confirming prior research on the subject, the use of complex stimuli allows these findings to be generalized to greater variations of stimuli than have been used in prior research. Finally, we demonstrated that the anterior insula responded to the negative valence of the computer warning stimuli and that this increased activation also demonstrated a repetition suppression effect over continued exposures. The habituation to warnings is a concern for computer security as users are less likely to attend and respond appropriately to repeated computer security warnings.

Data Availability Statement

The datasets generated for this study are available at https://doi.org/10.18112/openneuro.ds002363.v1.1.1. The code used in the analyses presented is available at https://github.com/Kirwanlab/RepetitionSuppression.

Ethics Statement

The studies involving human participants were reviewed and approved by Brigham Young University Institutional Review Board. The patients/participants provided their written informed consent to participate in this study.

Author Contributions

CBK, BA, AV, DE, and JJ conceptualized the experiment. DB, BA, AV, DE, and JJ collected stimuli and designed the experimental paradigm. CBK, DB, BA, and AV collected the data. CBK and DB performed the data analysis. CBK, DB, BA, AV, DE, and JJ edited and wrote the manuscript. All authors contributed to the article and approved the submitted version.

Funding

This work was supported by the National Science Foundation (1422831 to BA and 1247842 to DE) and Google (FRA-194 to AV).

Conflict of Interest

The authors declare that this study received funding from Google. The funder was not involved in the study design, collection, analysis, interpretation of data, the writing of this article or the decision to submit it for publication.

Footnotes

  1. ^ https://github.com/rordenlab/dcm2niix

References

Akhawe, D., and Felt, A. P. (2013). “Alice in warningland: a large-scale field study of browser security warning effectiveness,” in Proceedings of the 22nd USENIX Conference on Security, Washington, DC.

Google Scholar

Anderson, B. B., Jenkins, J. L., Vance, A., Kirwan, C. B., and Eargle, D. (2016a). Your memory is working against you: how eye tracking and memory explain habituation to security warnings. Dec. Support Syst. 92, 3–13.

Google Scholar

Anderson, B. B., Vance, A., Kirwan, C. B., Jenkins, J., and Eargle, D. (2016b). From warnings to wallpaper: why the brain habituates to security warnings and what can be done about it. J. Manag. Inform. Syst. 33, 713–743.

Google Scholar

Berlyne, D. E. (1970). Novelty, complexity, and hedonic value. Percept. Psychophys. 8, 279–286.

Google Scholar

Bravo-Lillo, C., Cranor, L., Komanduri, S., Schechter, S., and Sleeper, M. (2014). “Harder to ignore? Revisiting pop-up fatigue and approaches to prevent it,” in Proceedings of the 10th Symposium On Usable Privacy and Security ({SOUPS} 2014), Menlo Park, CA.

Google Scholar

Buchel, C., and Dolan, R. J. (2000). Classical fear conditioning in functional neuroimaging. Curr. Opin. Neurobiol. 10, 219–223.

Google Scholar

Buck, R., Khan, M., Fagan, M., and Coman, E. (2017). The user affective experience scale: a measure of emotions anticipated in response to pop-up computer warnings. Int. J. Hum. Comput. Interact. 34, 25–34. doi: 10.1080/10447318.2017.1314612

CrossRef Full Text | Google Scholar

Carlsson, K., Petersson, K. M., Lundqvist, D., Karlsson, A., Ingvar, M., and Ohman, A. (2004). Fear and the amygdala: manipulation of awareness generates differential cerebral responses to phobic and fear-relevant (but nonfeared) stimuli. Emotion 4, 340–353. doi: 10.1037/1528-3542.4.4.340

PubMed Abstract | CrossRef Full Text | Google Scholar

Chouinard, P. A., Morrissey, B. F., Kohler, S., and Goodale, M. A. (2008). Repetition suppression in occipital-temporal visual areas is modulated by physical rather than semantic features of objects. Neuroimage 41, 130–144. doi: 10.1016/j.neuroimage.2008.02.011

PubMed Abstract | CrossRef Full Text | Google Scholar

Costa-Faidella, J., Baldeweg, T., Grimm, S., and Escera, C. (2011). Interactions between “what” and “when” in the auditory system: temporal predictability enhances repetition suppression. J. Neurosci. 31, 18590–18597. doi: 10.1523/jneurosci.2599-11.2011

PubMed Abstract | CrossRef Full Text | Google Scholar

Cox, R. W. (1996). AFNI: software for analysis and visualization of functional magnetic resonance neuroimages. Comput. Biomed. Res. 29, 162–173. doi: 10.1006/cbmr.1996.0014

PubMed Abstract | CrossRef Full Text | Google Scholar

Cox, R. W., Chen, G., Glen, D. R., Reynolds, R. C., and Taylor, P. A. (2017). FMRI clustering in AFNI: false-positive rates redux. Brain Connect. 7, 152–171.

Google Scholar

Danckert, S. L., Gati, J. S., Menon, R. S., and Kohler, S. (2007). Perirhinal and hippocampal contributions to visual recognition memory can be distinguished from those of occipito-temporal structures based on conscious awareness of prior occurrence. Hippocampus 17, 1081–1092. doi: 10.1002/hipo.20347

PubMed Abstract | CrossRef Full Text | Google Scholar

Daselaar, S. M., Fleck, M. S., and Cabeza, R. (2006). Triple dissociation in the medial temporal lobes: recollection, familiarity, and novelty. J. Neurophysiol. 96, 1902–1911. doi: 10.1152/jn.01029.2005

PubMed Abstract | CrossRef Full Text | Google Scholar

Desmond, J. E., and Glover, G. H. (2002). Estimating sample size in functional MRI (fMRI) neuroimaging studies: statistical power analyses. J. Neurosci. Methods 118, 115–128.

Google Scholar

Dimoka, A. (2012). How to conduct a functional magnetic resonance (fMRI) study in social science research. MIS Q. 36, 811–840.

Google Scholar

Fox, M. D., Snyder, A. Z., Vincent, J. L., Corbetta, M., Van Essen, D. C., and Raichle, M. E. (2005). The human brain is intrinsically organized into dynamic, anticorrelated functional networks. Proc. Natl. Acad. Sci. U.S.A. 102, 9673–9678. doi: 10.1073/pnas.0504136102

PubMed Abstract | CrossRef Full Text | Google Scholar

Grill-Spector, K., Henson, R., and Martin, A. (2006). Repetition and the brain: neural models of stimulus-specific effects. Trends Cogn. Sci. 10, 14–23. doi: 10.1016/j.tics.2005.11.006

PubMed Abstract | CrossRef Full Text | Google Scholar

Grotheer, M., and Gyula, K. (2015). The relationship between stimulus repetitions and fulfilled expectations. Neuropsychologia 67, 175–182. doi: 10.1016/j.neuropsychologia.2014.12.017

PubMed Abstract | CrossRef Full Text | Google Scholar

Grupe, D. W., and Nitschke, J. B. (2013). Uncertainty and anticipation in anxiety: an integrated neurobiological and psychological perspective. Nat. Rev. Neurosci. 14, 488–501. doi: 10.1038/nrn3524

PubMed Abstract | CrossRef Full Text | Google Scholar

Kirwan, C. B., Shrager, Y., and Squire, L. R. (2009). Medial temporal lobe activity can distinguish between old and new stimuli independently of overt behavioral choice. Proc. Natl. Acad. Sci. U.S.A. 106, 14617–14621. doi: 10.1073/pnas.0907624106

PubMed Abstract | CrossRef Full Text | Google Scholar

Knutson, B., Katovich, K., and Suri, G. (2014). Inferring affect from fMRI data. Trends Cogn. Sci. 18, 422–428. doi: 10.1016/j.tics.2014.04.006

PubMed Abstract | CrossRef Full Text | Google Scholar

Kovacs, G., Kaiser, D., Kaliukhovich, D. A., Vidnyanszky, Z., and Vogels, R. (2013). Repetition probability does not affect fMRI repetition suppression for objects. J. Neurosci. 33, 9805–9812. doi: 10.1523/jneurosci.3423-12.2013

PubMed Abstract | CrossRef Full Text | Google Scholar

Lacy, J. W., Yassa, M. A., Stark, S. M., Muftuler, L. T., and Stark, C. E. (2011). Distinct pattern separation related transfer functions in human CA3/Dentate and CA1 revealed using high-resolution fmri and variable mnemonic similarity. Learn. Mem. 18, 15–18.

Google Scholar

Larsson, J., and Smith, A. T. (2012). fMRI repetition suppression: neuronal adaptation or stimulus expectation? Cereb. Cortex 22, 567–576. doi: 10.1093/cercor/bhr119

PubMed Abstract | CrossRef Full Text | Google Scholar

Li, X., Morgan, P. S., Ashburner, J., Smith, J., and Rorden, C. (2016). The first step for neuroimaging data analysis: DICOM to NIfTI conversion. J. Neurosci. Methods 264, 47–56.

Google Scholar

Malmierca, M. S., Cristaudo, S., Perez-Gonzalez, D., and Covey, E. (2009). Stimulus-specific adaptation in the inferior colliculus of the anesthetized rat. J. Neurosci. 29, 5483–5493. doi: 10.1523/jneurosci.4153-08.2009

PubMed Abstract | CrossRef Full Text | Google Scholar

Mason, M. F., Norton, M. I., Van Horn, J. D., Wegner, D. M., Grafton, S. T., and Macrae, C. N. (2007). Wandering minds: the default network and stimulus-independent thought. Science 315, 393–395. doi: 10.1126/science.1131295

PubMed Abstract | CrossRef Full Text | Google Scholar

Mayrhauser, L., Bergmann, J., Crone, J., and Kronbichler, M. (2014). Neural repetition suppression: evidence for perceptual expectation in object-selective regions. Front. Hum. Neurosci. 8:225. doi: 10.3389/fnhum.2014.00225

PubMed Abstract | CrossRef Full Text | Google Scholar

McDonald, C. R., Thesen, T., Carlson, C., Blumberg, M., Girard, H. M., and Trongnetrpunya, A. (2010). Multimodal imaging of repetition priming: using fMRI, MEG, and intracranial EEG to reveal spatiotemporal profiles of word processing. Neuroimage 53, 707–717. doi: 10.1016/j.neuroimage.2010.06.069

PubMed Abstract | CrossRef Full Text | Google Scholar

Muncy, N. M., Hedges-Muncy, A. M., and Kirwan, C. B. (2017). Discrete pre-processing step effects in registration-based pipelines, a preliminary volumetric study on T1-weighted image. PLoS One 12:e0186071. doi: 10.1371/journal.pone.0186071

PubMed Abstract | CrossRef Full Text | Google Scholar

Olsson, A., and Phelps, E. A. (2007). Social learning of fear. Nat. Neurosci. 10, 1095–1102. doi: 10.1038/nn1968

PubMed Abstract | CrossRef Full Text | Google Scholar

Paulus, M. P., and Stein, M. B. (2006). An insular view of anxiety. Biol. Psychiatry 60, 383–387. doi: 10.1016/j.biopsych.2006.03.042

PubMed Abstract | CrossRef Full Text | Google Scholar

Pechmann, C., and Stewart, D. W. (1988). Advertising repetition: a critical review of wearin and wearout. Curr. Issues Res. Advert. 11, 285–329. doi: 10.1080/01633392.1988.10504936

CrossRef Full Text | Google Scholar

Phelps, E. A., O’Connor, K. J., Gatenby, J. C., Gore, J. C., Grillon, C., and Davis, M. (2001). Activation of the left amygdala to a cognitive representation of fear. Nat. Neurosci. 4, 437–441. doi: 10.1038/86110

PubMed Abstract | CrossRef Full Text | Google Scholar

Phillips, R. G., and LeDoux, J. E. (1992). Differential contribution of amygdala and hippocampus to cued and contextual fear conditioning. Behav. Neurosci. 106, 274–285.

Google Scholar

Raichle, M. E. (2015). The brain’s default mode network. Annu. Rev. Neurosci. 38, 433–447.

Google Scholar

Raichle, M. E., and Snyder, A. Z. (2007). A default mode of brain function: a brief history of an evolving idea. Neuroimage 37, 1083–1090. doi: 10.1016/j.neuroimage.2007.02.041

PubMed Abstract | CrossRef Full Text | Google Scholar

Schmidt, S., and Eisend, M. (2015). Advertising repetition: a meta-analysis on effective frequency in advertising. J. Advert. 44, 415–428.

Google Scholar

Segaert, K., Weber, K., de Lange, F. P., Petersson, K. M., and Hagoort, P. (2013). The suppression of repetition enhancement: a review of fMRI studies. Neuropsychologia 51, 59–66.

Google Scholar

Shrager, Y., Kirwan, C. B., and Squire, L. R. (2008). Activity in both hippocampus and perirhinal cortex predicts the memory strength of subsequently remembered information. Neuron 59, 547–553. doi: 10.1016/j.neuron.2008.07.022

PubMed Abstract | CrossRef Full Text | Google Scholar

Stern, C. E., Corkin, S., Gonzalez, R. G., Guimaraes, A. R., Baker, J. R., and Jennings, P. J. (1996). The hippocampal formation participates in novel picture encoding: evidence from functional magnetic resonance imaging. Proc. Natl. Acad. Sci. U.S.A. 93, 8660–8665. doi: 10.1073/pnas.93.16.8660

PubMed Abstract | CrossRef Full Text | Google Scholar

Summerfield, C., Trittschuh, E. H., Monti, J. M., Mesulam, M. M., and Egner, T. (2008). Neural repetition suppression reflects fulfilled perceptual expectations. Nat. Neurosci. 11, 1004–1006. doi: 10.1038/nn.2163

PubMed Abstract | CrossRef Full Text | Google Scholar

Summerfield, C., Wyart, V., Johnen, V. M., and de Gardelle, V. (2011). Human scalp electroencephalography reveals that repetition suppression varies with expectation. Front. Hum. Neurosci. 5:67. doi: 10.3389/fnhum.2011.00067

PubMed Abstract | CrossRef Full Text | Google Scholar

Todorovic, A., and de Lange, F. P. (2012). Repetition suppression and expectation suppression are dissociable in time in early auditory evoked fields. J. Neurosci. 32, 13389–13395. doi: 10.1523/jneurosci.2227-12.2012

PubMed Abstract | CrossRef Full Text | Google Scholar

Todorovic, A., van Ede, F., Maris, E., and de Lange, F. P. (2011). Prior expectation mediates neural adaptation to repeated sounds in the auditory cortex: an MEG study. J. Neurosci. 31, 9118–9123. doi: 10.1523/jneurosci.1425-11.2011

PubMed Abstract | CrossRef Full Text | Google Scholar

Valentini, E. (2011). The role of perceptual expectation on repetition suppression: a quest to dissect the differential contribution of probability of occurrence and event predictability. Front. Hum. Neurosci. 5:143. doi: 10.3389/fnhum.2011.00143

PubMed Abstract | CrossRef Full Text | Google Scholar

Vance, A., Jenkins, J. L., Anderson, B. B., Bjornn, D., and Kirwan, B. (2018). Tuning out security warnings: a longitudinal examination of habituation through fMRI, eye tracking, and field experiments. MIS Q. 42, 355–380.

Google Scholar

Vance, A., Kirwan, B., Bjornn, D., Jenkins, J., and Anderson, B. B. (2017). “What do we really know about how habituation to warnings occurs over time? A longitudinal fMRI study of habituation and polymorphic warnings,” in Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, (New York, NY: Association for Computing Machinery).

Google Scholar

Wogalter, M., and Vigilante, W. J. Jr. (2006). “Attention switch and maintenance,” in Handbook of Warnings, ed. M. S. Wogalter (Mahwah, NJ: Erlbaum), 245–266.

Google Scholar

Keywords: repetition suppression, fMRI, habituation, anterior insula, cybersecurity

Citation: Kirwan CB, Bjornn DK, Anderson BB, Vance A, Eargle D and Jenkins JL (2020) Repetition of Computer Security Warnings Results in Differential Repetition Suppression Effects as Revealed With Functional MRI. Front. Psychol. 11:528079. doi: 10.3389/fpsyg.2020.528079

Received: 18 January 2020; Accepted: 11 November 2020;
Published: 07 December 2020.

Edited by:

David Maimon, Georgia State University, United States

Reviewed by:

Irina M. Harris, The University of Sydney, Australia
Zarul Fitri Zaaba, Universiti Sains Malaysia (USM), Malaysia
Eric A. Walden, Texas Tech University, United States
Adriane B. Randolph, Kennesaw State University, United States

Copyright © 2020 Kirwan, Bjornn, Anderson, Vance, Eargle and Jenkins. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: C. Brock Kirwan, a2lyd2FuQGJ5dS5lZHU=

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.