Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1978942.1979072acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Does MoodyBoard make internet use more secure?: evaluating an ambient security visualization tool

Published: 07 May 2011 Publication History

Abstract

Internet users are targets for ever-advancing phishing- and other attacks. The risks are, for example, to disclose credit card information or passwords to unauthorized instances. One approach to help users with insecure situations is provided by MoodyBoard, which uses ambient information to highlight potential risks. In this paper, we present findings from an evaluation of this system. Two user studies were conducted in order to find out whether an ambient security tool can protect users during sensitive tasks. We designed a pilot study to find out whether users understand the warnings and a security study to see if it helps to protect users from phishing attacks. Results show that MoodyBoard users behaved significantly more secure.

References

[1]
Adams, A. and Sasse, M. A. Users are not the enemy. Commun. ACM 42, 12 (Dec. 1999).
[2]
Amer, T.S., Maris, J.B. Signal words and signal icons in application control and information technology exception messages -" hazard matching and habituation effects. Tech. Rep. Work. Paper. Series 06-05, Northern Arizona University, Flagstaff, AZ, October 2006.
[3]
De Luca, A., Frauendienst, B., Maurer, M., and Hausen, D. 2010. On the design of a "moody" keyboard. In Proc. DIS '10. Aarhus, Denmark, August 16 - 20, 2010.
[4]
Dhamija, R., Tygar, J.D., Hearst, M. Why phishing works. In Proc. CHI '06. Montréal, Québec, Canada, 2006.
[5]
Egelman, S., Cranor, L. F., and Hong, J. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proc. CHI '08, Florence, Italy, 2008.
[6]
Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L. F., and Hong, J. Teaching Johnny not to fall for phish. ACM Trans. Internet Technol. 10, 2, Article 7, June 2010.
[7]
Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F. Crying Wolf: An empirical study of SSL warning effectiveness. In Proc. USENIX '09.
[8]
Ware, C. Information Visualization, Second Edition: Perception for Design. Morgan Kaufmann, 2004.
[9]
Whitten A., Tygar J.D. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proc. USENIX '99.
[10]
Wu M., Miller R.C., Garfinkel S.L. Do security toolbars actually prevent phishing attacks? In Proc. CHI '06. Montréal, Québec, Canada, 2006.

Cited By

View all
  • (2018)In search of perfect usersProceedings of the 30th Australian Conference on Computer-Human Interaction10.1145/3292147.3292231(572-576)Online publication date: 4-Dec-2018
  • (2014)Towards a contingency approach with whitelist-and blacklist-based anti-phishing applicationsBehaviour & Information Technology10.1080/0144929X.2013.87522133:11(1136-1147)Online publication date: 1-Nov-2014
  • (2012)A usability test of whitelist and blacklist-based anti-phishing applicationProceeding of the 16th International Academic MindTrek Conference10.1145/2393132.2393170(195-202)Online publication date: 3-Oct-2012

Index Terms

  1. Does MoodyBoard make internet use more secure?: evaluating an ambient security visualization tool
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      May 2011
      3530 pages
      ISBN:9781450302289
      DOI:10.1145/1978942
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 May 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. MoodyBoard
      2. ambient visualization
      3. awareness
      4. security

      Qualifiers

      • Research-article

      Conference

      CHI '11
      Sponsor:

      Acceptance Rates

      CHI '11 Paper Acceptance Rate 410 of 1,532 submissions, 27%;
      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI '25
      CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 16 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)In search of perfect usersProceedings of the 30th Australian Conference on Computer-Human Interaction10.1145/3292147.3292231(572-576)Online publication date: 4-Dec-2018
      • (2014)Towards a contingency approach with whitelist-and blacklist-based anti-phishing applicationsBehaviour & Information Technology10.1080/0144929X.2013.87522133:11(1136-1147)Online publication date: 1-Nov-2014
      • (2012)A usability test of whitelist and blacklist-based anti-phishing applicationProceeding of the 16th International Academic MindTrek Conference10.1145/2393132.2393170(195-202)Online publication date: 3-Oct-2012

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media