Sonifying Internet security threats

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations


The Internet enables users to access vast resources, but it can also expose users to harmful cyber-attacks. It is imperative that users be informed about a security incident in a timely manner in order to make proper decisions. Visualization of security threats and warnings is one of the effective ways to inform users. However, visual cues are not always accessible to all users, and in particular, those with visual impairments. This late-breaking-work paper hypothesizes that the use of proper sounds in conjunction with visual cues can better represent security alerts to all users. Toward our research goal to validate this hypothesis, we first describe a methodology, referred to as sonification, to effectively design and develop auditory cyber-security threat indicators to warn users about cyber-attacks. Next, we present a case study, along with the results, of various types of usability testing conducted on a number of Internet users who are visually impaired. The presented concept can be viewed as a general framework for the creation and evaluation of human factor interactions with sounds in a cyber-space domain. The paper concludes with a discussion of future steps to enhance this work.

Original languageEnglish
Title of host publicationCHI EA 2016
Subtitle of host publication#chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems
PublisherAssociation for Computing Machinery
Number of pages8
ISBN (Electronic)9781450340823
StatePublished - May 7 2016
Event34th Annual CHI Conference on Human Factors in Computing Systems, CHI EA 2016 - San Jose, United States
Duration: May 7 2016May 12 2016

Publication series

NameConference on Human Factors in Computing Systems - Proceedings


Conference34th Annual CHI Conference on Human Factors in Computing Systems, CHI EA 2016
Country/TerritoryUnited States
CitySan Jose


  • Internet security threats
  • Sonification
  • Usability testing
  • Visually impaired


Dive into the research topics of 'Sonifying Internet security threats'. Together they form a unique fingerprint.

Cite this