Principles are based on scientific sources.
| Name | Reciprocity |
| Sources | (Chiasson et al., 2007) (Stobert et al., 2007) |
| Synonyms | None |
| Intent | Harnessing the human tendency to return favors. |
| Motivation | The
norm
of
reciprocity
is
at
work
when
people
respond
with
similar
kinds
of
behaviour
to
that
which
they
are
shown.
Positive
overtures
usually
lead
to
cooperation
with
others
. However,
rudeness
and
unhelpfulness
can
also
lead
people
to
behave
similarly
in
response.
People respond reciprocally to computers , so a security program should make it obvious that it is helping its users. |
| Examples | None |
| Guidelines | None |
| Tags | None |
| Log history | [02/14/2016]: Added to repository [04/22/2016]: Deleted “Principle of” |
Chiasson, S., Biddle, R., Somayaji, A., 2007. Even Experts Deserve Usable Security: Design guidelines for security management systems, in:.
Stobert, E., Chiasson, S., Biddle, R., 2007. Persuasion, Social Graces, and Computer Security.