Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3578997.3579006acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsebConference Proceedingsconference-collections
research-article

A Study on the Design of Pandora's Box Web Application Using Design Thinking approach: A study on a centralized web browser security extension design and planned realization

Published: 04 March 2023 Publication History

Abstract

The prevailing cybersecurity problem continues to distract internet users from having a smooth and safe web browsing experience. With this issue encountered, the study aims to provide a product design that focuses on preventing and lessening cybersecurity threats through a browser security extension that is more reliable and convenient for users. The study will utilize the design thinking approach to determine the proposed product's design. The major findings of the study show that users are still facing issues with used and familiar available extensions, and a centralized all-in-one browser security extension that includes features such as Ad Manager, Cookies Manager, Website Blocker/Tracker, VPN, and a personalized dashboard would be beneficial to meet their security needs, however, further testing and feedback are still needed to provide improvements for the proposed product.

References

[1]
2021. Review42.com. Retrieved July 25, 2022 from https://review42.com/resources/hacking-statistics/
[2]
2022. Goal 9: Industry, innovation and infrastructure - The Global Goals. The Global Goals. Retrieved July 25, 2022 from https://www.globalgoals.org/goals/9-industry-innovation-and-infrastructure/
[3]
Charles Reis, Adam Barth, and Carlos Pizano. 2009. Browser Security: Lessons from Google Chrome Google Chrome developers focused on three key problems to... ResearchGate. Retrieved July 25, 2022 from https://www.researchgate.net/publication/242264277_Browser_Security_Lessons_from_Google_Chrome_Google_Chrome_developers_focused_on_three_key_problems_to_shield_the_browser_from_attacks
[4]
2022. Hardening the security analysis of browser extensions | Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing. ACM Conferences. Retrieved July 25, 2022 from https://dl.acm.org/doi/abs/10.1145/3477314.3507098
[5]
Dora Luz González-Bañales and Linda Elizabeth Soto Ortíz. 2017. Empathy Map as a Tool to Analyze Human-Computer Interaction in the Elderly. In Proceedings of the 8th Latin American Conference on Human-Computer Interaction (CLIHC '17). Association for Computing Machinery, New York, NY, USA, Article 17, 1–3. https://doi.org/10.1145/3151470.3156642
[6]
Mimi An. WHY PEOPLE BLOCK ADS And What It Means for Marketers and Advertisers. Retrieved from https://www.upa.it/static/upload/why/why-people-block-ads/why-people-block-ads.pdf
[7]
2018. How Important is User Interface Design? Plego.com. Retrieved July 25, 2022 from https://www.plego.com/blog/importance-user-interface-design/#:∼:text=Simply%20put%2C%20User%20Interface%20Design,your%20customers%20and%20your%20website.
[8]
Sruthi Bandhakavi, Nandit Tiku, Wyatt Pittman, Samuel T. King, P. Madhusudan, and Marianne Winslett. 2011. Vetting browser extensions for security vulnerabilities with VEX. Communications of the ACM 54, 9 (September 2011), 91.
[9]
Darryn Balanco. 2013. Importance Of Website Navigation. Optimus01. Retrieved July 25, 2022 from https://www.optimus01.co.za/importance-of-website-navigation/
[10]
2020. Benefits and Challenges of Dashboards. DashboardFox. Retrieved July 25, 2022 from https://dashboardfox.com/guides/business-dashboard-guide/benefits-and-challenges-of-dashboards/
[11]
2021. Do not allow pop-up ads to appear too early: Internet users’ browsing behaviour to pop-up ads. Behaviour & Information Technology. Retrieved July 25, 2022 from https://www.tandfonline.com/doi/abs/10.1080/0144929X.2020.1784282
[12]
V. Aravind and M. Sethumadhavan. 2014. A Framework for Analysing the Security of Chrome Extensions. Advanced Computing, Networking and Informatics- Volume 2 (2014), 267–272.
[13]
2020.Cookie Benchmark study. Retrieved from https://www2.deloitte.com/content/dam/Deloitte/nl/Documents/risk/deloitte-nl-risk-cookie-benchmark-study.pdf
[14]
Chamandeep Kaur and Yogesh Kumar. 2020. The vital role of VPN in making secure connection over internet world. ResearchGate. Retrieved July 25, 2022 from https://www.researchgate.net/publication/340336829_The_vital_role_of_VPN_in_making_secure_connection_over_internet_world
[15]
Nazli Ekim. 2020. Incognito Mode: How Secure Is It Really? - Keeper Security Blog - Cybersecurity News & Product Updates. Keeper Security Blog - Cybersecurity News & Product Updates - Cybersecurity starts with Keeper Security. Stay up-to-date with the latest cybersecurity news and insights, as well as product updates and announcements. Retrieved July 25, 2022 from https://www.keepersecurity.com/blog/2020/12/14/incognito-mode-is-it-safe-keeper-security/

Index Terms

  1. A Study on the Design of Pandora's Box Web Application Using Design Thinking approach: A study on a centralized web browser security extension design and planned realization

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICSEB '22: Proceedings of the 2022 6th International Conference on Software and e-Business
    December 2022
    141 pages
    ISBN:9798400700095
    DOI:10.1145/3578997
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 March 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICSEB 2022

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 45
      Total Downloads
    • Downloads (Last 12 months)25
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 30 Sep 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media