Cargando…

Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks

Cyber-attacks are a continuing problem. These attacks are problematic for users who are visually impaired and cannot rely on visual cues to indicate a potential cyber-attack. Sonification is an alternative way to help users who are visually impaired detect potential cyber-attacks. Sonification provi...

Descripción completa

Detalles Bibliográficos
Autores principales: Jones, Keith S., Lodinger, Natalie R., Widlus, Benjamin P., Namin, Akbar Siami, Maw, Emily, Armstrong, Miriam
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9628296/
http://dx.doi.org/10.1007/s12193-022-00397-z
_version_ 1784823166043947008
author Jones, Keith S.
Lodinger, Natalie R.
Widlus, Benjamin P.
Namin, Akbar Siami
Maw, Emily
Armstrong, Miriam
author_facet Jones, Keith S.
Lodinger, Natalie R.
Widlus, Benjamin P.
Namin, Akbar Siami
Maw, Emily
Armstrong, Miriam
author_sort Jones, Keith S.
collection PubMed
description Cyber-attacks are a continuing problem. These attacks are problematic for users who are visually impaired and cannot rely on visual cues to indicate a potential cyber-attack. Sonification is an alternative way to help users who are visually impaired detect potential cyber-attacks. Sonification provides information to users using non-speech sounds. Sonification could provide users who are visually impaired with information on potential cyber-attack consequences that could stem from their actions. However, there are two challenges with sonifying cyber-attack consequences. First, there are many potential cyber-attack consequences to sonify, and humans have a limited ability to remember associations between sonifications and their meanings. Second, cyber-attack warning messages are better trusted when they align the severity of the consequences with the user’s perceived severity. However, we do not know the perceived severity of individual consequences. Therefore, we need to reduce the number of consequences to sonify and to determine the perceived severity of these consequences. We had non-expert participants group cyber-attack consequences based on perceived similarity. Analyses revealed that participants’ groupings formed seven clusters. We then had non-expert participants rate the perceived severity of each cyber-attack consequence. Those ratings were used to determine the perceived severity of each cluster. These efforts resulted in a set of cyber-attack consequence clusters that (a) is small enough that users should be able to remember associations between sonifications and their meanings, and (b) can be sonified in a way that reflects users’ perceptions regarding the severity of the clustered cyber-attack consequences. As such, the results of these studies are critical steps towards creating effective sonifications that serve as cyber-security warning messages.
format Online
Article
Text
id pubmed-9628296
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-96282962022-11-02 Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks Jones, Keith S. Lodinger, Natalie R. Widlus, Benjamin P. Namin, Akbar Siami Maw, Emily Armstrong, Miriam J Multimodal User Interfaces Original Paper Cyber-attacks are a continuing problem. These attacks are problematic for users who are visually impaired and cannot rely on visual cues to indicate a potential cyber-attack. Sonification is an alternative way to help users who are visually impaired detect potential cyber-attacks. Sonification provides information to users using non-speech sounds. Sonification could provide users who are visually impaired with information on potential cyber-attack consequences that could stem from their actions. However, there are two challenges with sonifying cyber-attack consequences. First, there are many potential cyber-attack consequences to sonify, and humans have a limited ability to remember associations between sonifications and their meanings. Second, cyber-attack warning messages are better trusted when they align the severity of the consequences with the user’s perceived severity. However, we do not know the perceived severity of individual consequences. Therefore, we need to reduce the number of consequences to sonify and to determine the perceived severity of these consequences. We had non-expert participants group cyber-attack consequences based on perceived similarity. Analyses revealed that participants’ groupings formed seven clusters. We then had non-expert participants rate the perceived severity of each cyber-attack consequence. Those ratings were used to determine the perceived severity of each cluster. These efforts resulted in a set of cyber-attack consequence clusters that (a) is small enough that users should be able to remember associations between sonifications and their meanings, and (b) can be sonified in a way that reflects users’ perceptions regarding the severity of the clustered cyber-attack consequences. As such, the results of these studies are critical steps towards creating effective sonifications that serve as cyber-security warning messages. Springer International Publishing 2022-11-01 2022 /pmc/articles/PMC9628296/ http://dx.doi.org/10.1007/s12193-022-00397-z Text en © The Author(s), under exclusive licence to Springer Nature Switzerland AG 2022, Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Original Paper
Jones, Keith S.
Lodinger, Natalie R.
Widlus, Benjamin P.
Namin, Akbar Siami
Maw, Emily
Armstrong, Miriam
Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks
title Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks
title_full Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks
title_fullStr Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks
title_full_unstemmed Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks
title_short Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks
title_sort grouping and determining perceived severity of cyber-attack consequences: gaining information needed to sonify cyber-attacks
topic Original Paper
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9628296/
http://dx.doi.org/10.1007/s12193-022-00397-z
work_keys_str_mv AT joneskeiths groupinganddeterminingperceivedseverityofcyberattackconsequencesgaininginformationneededtosonifycyberattacks
AT lodingernatalier groupinganddeterminingperceivedseverityofcyberattackconsequencesgaininginformationneededtosonifycyberattacks
AT widlusbenjaminp groupinganddeterminingperceivedseverityofcyberattackconsequencesgaininginformationneededtosonifycyberattacks
AT naminakbarsiami groupinganddeterminingperceivedseverityofcyberattackconsequencesgaininginformationneededtosonifycyberattacks
AT mawemily groupinganddeterminingperceivedseverityofcyberattackconsequencesgaininginformationneededtosonifycyberattacks
AT armstrongmiriam groupinganddeterminingperceivedseverityofcyberattackconsequencesgaininginformationneededtosonifycyberattacks