Usability Evaluation of Active Anti-Phishing Browser Extensions for Persons with Visual Impairments

被引:0
|
作者
Sonowal, Gunikhan [1 ]
Kuppusamy, K. S. [1 ]
Kumar, Ajit [1 ]
机构
[1] Pondicherry Univ, Sch Engn & Technol, Dept Comp Sci, Pondicherry, India
来源
2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS) | 2017年
关键词
persons with visual impairments; anti-phishing; phishing; accessibility; usability; browser extension;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Accessibility is an integral element of Human Computer Interaction (HCI) domain which deals with building the tools in the digital ecosystem that shall be used universally by all categories of users irrespective of their disabilities. For persons with disabilities the security in the digital environments acquires increased significance as they are one among the leading soft targets. Phishing is an active cyber security issue which is based on both technical and social engineering components. A wide variety of Anti-Phishing tool have been developed to detect phishing sites. In Phishing the attackers target internet users for providing important credentials by sending fraudulent emails with links to a site which is visually similar to its legitimate counterpart. Anti-phishing tools help users for combating these frauds but from the accessibility perspective there are still barriers for persons with visual impairments. The major objective of this paper is to provide an insight into these accessibility barriers in the interface of Anti-Phishing browser extensions for persons with visual impairments. The scope of this study is in the accessibility dimension and hence the core anti-phishing methodology adopted by these tools are not elaborated in detail. With the outcome of this accessibility analysis study of these anti-phishing tools, potential suggestions are also listed out in this paper to reduce the barriers faced by persons with visual impairments.
引用
收藏
页数:6
相关论文
共 27 条
  • [1] Usability evaluation of anti-phishing toolbars
    Linfeng Li
    Marko Helenius
    Journal in Computer Virology, 2007, 3 (2): : 163 - 184
  • [2] Usability evaluation of anti-phishing toolbars
    Li, Linfeng
    Helenius, Marko
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (02): : 163 - 184
  • [3] Visual security is feeble for Anti-Phishing
    Leung, Chun-Ming
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 118 - 123
  • [4] Light weight anti-phishing with user whitelisting in a web browser
    Wang, Yue
    Agrawal, Rinky
    Choi, Baek-Young
    2008 IEEE REGION 5 CONFERENCE, 2008, : 39 - 42
  • [5] An Evaluation of Users' Anti-Phishing Knowledge Retention
    Alnajim, Abdullah
    Munro, Malcolm
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 210 - 214
  • [6] Development of anti-phishing browser based on random forest and rule of extraction framework
    Gowda, Mohith H. R.
    Adithya, M., V
    Prasad, Gunesh S.
    Vinay, S.
    CYBERSECURITY, 2020, 3 (01)
  • [7] Browser Extension based Hybrid Anti-Phishing Framework using Feature Selection
    Maurya, Swati
    Saini, Harpreet Singh
    Jain, Anurag
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 579 - 588
  • [8] Development of anti-phishing browser based on random forest and rule of extraction framework
    Mohith Gowda HR
    Adithya MV
    Gunesh Prasad S
    Vinay S
    Cybersecurity, 3
  • [9] Phish-Shelter: A Novel Anti-Phishing Browser Using Fused Machine Learning
    Rahman, Rizwan Ur
    Yadav, Lokesh
    Tomar, Deepak Singh
    JOURNAL OF INFORMATION TECHNOLOGY RESEARCH, 2022, 15 (01)
  • [10] Visual Similarity based Anti-Phishing with the Combination of Local and Global Features
    Zhou, Yu
    Zhang, Yongzheng
    Xiao, Jun
    Wang, Yipeng
    Lin, Weiyao
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 189 - 196