Cargando…
Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks
Cyber-attacks are a continuing problem. These attacks are problematic for users who are visually impaired and cannot rely on visual cues to indicate a potential cyber-attack. Sonification is an alternative way to help users who are visually impaired detect potential cyber-attacks. Sonification provi...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9628296/ http://dx.doi.org/10.1007/s12193-022-00397-z |
_version_ | 1784823166043947008 |
---|---|
author | Jones, Keith S. Lodinger, Natalie R. Widlus, Benjamin P. Namin, Akbar Siami Maw, Emily Armstrong, Miriam |
author_facet | Jones, Keith S. Lodinger, Natalie R. Widlus, Benjamin P. Namin, Akbar Siami Maw, Emily Armstrong, Miriam |
author_sort | Jones, Keith S. |
collection | PubMed |
description | Cyber-attacks are a continuing problem. These attacks are problematic for users who are visually impaired and cannot rely on visual cues to indicate a potential cyber-attack. Sonification is an alternative way to help users who are visually impaired detect potential cyber-attacks. Sonification provides information to users using non-speech sounds. Sonification could provide users who are visually impaired with information on potential cyber-attack consequences that could stem from their actions. However, there are two challenges with sonifying cyber-attack consequences. First, there are many potential cyber-attack consequences to sonify, and humans have a limited ability to remember associations between sonifications and their meanings. Second, cyber-attack warning messages are better trusted when they align the severity of the consequences with the user’s perceived severity. However, we do not know the perceived severity of individual consequences. Therefore, we need to reduce the number of consequences to sonify and to determine the perceived severity of these consequences. We had non-expert participants group cyber-attack consequences based on perceived similarity. Analyses revealed that participants’ groupings formed seven clusters. We then had non-expert participants rate the perceived severity of each cyber-attack consequence. Those ratings were used to determine the perceived severity of each cluster. These efforts resulted in a set of cyber-attack consequence clusters that (a) is small enough that users should be able to remember associations between sonifications and their meanings, and (b) can be sonified in a way that reflects users’ perceptions regarding the severity of the clustered cyber-attack consequences. As such, the results of these studies are critical steps towards creating effective sonifications that serve as cyber-security warning messages. |
format | Online Article Text |
id | pubmed-9628296 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Springer International Publishing |
record_format | MEDLINE/PubMed |
spelling | pubmed-96282962022-11-02 Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks Jones, Keith S. Lodinger, Natalie R. Widlus, Benjamin P. Namin, Akbar Siami Maw, Emily Armstrong, Miriam J Multimodal User Interfaces Original Paper Cyber-attacks are a continuing problem. These attacks are problematic for users who are visually impaired and cannot rely on visual cues to indicate a potential cyber-attack. Sonification is an alternative way to help users who are visually impaired detect potential cyber-attacks. Sonification provides information to users using non-speech sounds. Sonification could provide users who are visually impaired with information on potential cyber-attack consequences that could stem from their actions. However, there are two challenges with sonifying cyber-attack consequences. First, there are many potential cyber-attack consequences to sonify, and humans have a limited ability to remember associations between sonifications and their meanings. Second, cyber-attack warning messages are better trusted when they align the severity of the consequences with the user’s perceived severity. However, we do not know the perceived severity of individual consequences. Therefore, we need to reduce the number of consequences to sonify and to determine the perceived severity of these consequences. We had non-expert participants group cyber-attack consequences based on perceived similarity. Analyses revealed that participants’ groupings formed seven clusters. We then had non-expert participants rate the perceived severity of each cyber-attack consequence. Those ratings were used to determine the perceived severity of each cluster. These efforts resulted in a set of cyber-attack consequence clusters that (a) is small enough that users should be able to remember associations between sonifications and their meanings, and (b) can be sonified in a way that reflects users’ perceptions regarding the severity of the clustered cyber-attack consequences. As such, the results of these studies are critical steps towards creating effective sonifications that serve as cyber-security warning messages. Springer International Publishing 2022-11-01 2022 /pmc/articles/PMC9628296/ http://dx.doi.org/10.1007/s12193-022-00397-z Text en © The Author(s), under exclusive licence to Springer Nature Switzerland AG 2022, Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Original Paper Jones, Keith S. Lodinger, Natalie R. Widlus, Benjamin P. Namin, Akbar Siami Maw, Emily Armstrong, Miriam Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks |
title | Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks |
title_full | Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks |
title_fullStr | Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks |
title_full_unstemmed | Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks |
title_short | Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks |
title_sort | grouping and determining perceived severity of cyber-attack consequences: gaining information needed to sonify cyber-attacks |
topic | Original Paper |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9628296/ http://dx.doi.org/10.1007/s12193-022-00397-z |
work_keys_str_mv | AT joneskeiths groupinganddeterminingperceivedseverityofcyberattackconsequencesgaininginformationneededtosonifycyberattacks AT lodingernatalier groupinganddeterminingperceivedseverityofcyberattackconsequencesgaininginformationneededtosonifycyberattacks AT widlusbenjaminp groupinganddeterminingperceivedseverityofcyberattackconsequencesgaininginformationneededtosonifycyberattacks AT naminakbarsiami groupinganddeterminingperceivedseverityofcyberattackconsequencesgaininginformationneededtosonifycyberattacks AT mawemily groupinganddeterminingperceivedseverityofcyberattackconsequencesgaininginformationneededtosonifycyberattacks AT armstrongmiriam groupinganddeterminingperceivedseverityofcyberattackconsequencesgaininginformationneededtosonifycyberattacks |