Sonifying Internet security threats

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

The Internet enables users to access vast resources, but it can also expose users to harmful cyber-attacks. It is imperative that users be informed about a security incident in a timely manner in order to make proper decisions. Visualization of security threats and warnings is one of the effective ways to inform users. However, visual cues are not always accessible to all users, and in particular, those with visual impairments. This late-breaking-work paper hypothesizes that the use of proper sounds in conjunction with visual cues can better represent security alerts to all users. Toward our research goal to validate this hypothesis, we first describe a methodology, referred to as sonification, to effectively design and develop auditory cyber-security threat indicators to warn users about cyber-attacks. Next, we present a case study, along with the results, of various types of usability testing conducted on a number of Internet users who are visually impaired. The presented concept can be viewed as a general framework for the creation and evaluation of human factor interactions with sounds in a cyber-space domain. The paper concludes with a discussion of future steps to enhance this work.

Original languageEnglish
Title of host publicationCHI EA 2016
Subtitle of host publication#chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems
PublisherAssociation for Computing Machinery
Pages2306-2313
Number of pages8
ISBN (Electronic)9781450340823
DOIs
StatePublished - May 7 2016
Event34th Annual CHI Conference on Human Factors in Computing Systems, CHI EA 2016 - San Jose, United States
Duration: May 7 2016May 12 2016

Publication series

NameConference on Human Factors in Computing Systems - Proceedings
Volume07-12-May-2016

Conference

Conference34th Annual CHI Conference on Human Factors in Computing Systems, CHI EA 2016
CountryUnited States
CitySan Jose
Period05/7/1605/12/16

Keywords

  • Internet security threats
  • Sonification
  • Usability testing
  • Visually impaired

Fingerprint Dive into the research topics of 'Sonifying Internet security threats'. Together they form a unique fingerprint.

  • Cite this

    Namin, A. S., Jones, K. S., Hewett, R., & Pogrund, R. (2016). Sonifying Internet security threats. In CHI EA 2016: #chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems (pp. 2306-2313). (Conference on Human Factors in Computing Systems - Proceedings; Vol. 07-12-May-2016). Association for Computing Machinery. https://doi.org/10.1145/2851581.2892363