Skip to main content

Impact of the Cyber Hygiene Intelligence and Performance (CHIP) Interface on Cyber Situation Awareness and Cyber Hygiene

  • Conference paper
  • First Online:
HCI International 2021 - Late Breaking Papers: Design and User Experience (HCII 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 13094))

Included in the following conference series:

Abstract

A common theme across cybersecurity solutions is a lack of transparency for end-users. Our prototype, Cyber Hygiene Intelligence & Performance (CHIP), was purposefully designed to improve end users’ cyber hygiene and cyber situation awareness. We begin by addressing current cybersecurity training solutions, their inability to continuously impact user cyber hygiene and cyber situation awareness (CSA), and how end users’ needs for transparency are overlooked. We then illustrate the major stages of our design process for the medium-fidelity CHIP prototype, including defining, ideation, prototyping, and analysis. For each design stage, we describe our methodologies, major decision points, design considerations, and outcomes. We then highlight our between-groups survey experiment that measured cyber hygiene and CSA for an experimental group, who received CHIP notifications while completing web-based tasks, compared to a control group, who completed the same tasks without any notifications. Our findings show promise for a web application-based solution like CHIP to increase cyber hygiene and CSA for specific cyber threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ng, B.Y., Xu, Y.: Studying users’ computer security behavior using the Health Belief Model. In: Pacific Asia Conference on Information Systems (PACIS) 2007 Proceedings, vol. 45, pp. 423–437 (2007)

    Google Scholar 

  2. Assante, M.J., Tobey, D.H.: Enhancing the cybersecurity workforce. IT Prof. 13(1), 12–15 (2011)

    Article  Google Scholar 

  3. Aloul, F.A.: The need for effective information security awareness. J. Adv. Inf. Technol. 3(3), 176–183 (2012)

    Google Scholar 

  4. Nagarajan, A., Allbeck, J.M., Sood, A., Janssen, T.L.: Exploring game design for cybersecurity training. In: 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), pp. 256–262 (2012)

    Google Scholar 

  5. Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviors and knowledge. J. Inf. Secur. Appl. 42, 36–45 (2018)

    Google Scholar 

  6. Carter, A.: The Department of Defense cyber strategy. The US Department of Defense, Washington, DC (2015). https://archive.defense.gov/home/features/2015/0415_cyber-strategy/final_2015_dod_cyber_strategy_for_web.pdf. Accessed 10 June 2021

  7. Griffith, V., Jakobsson, M.: Messin’ with Texas deriving mother’s maiden names using public records. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) Applied Cryptography and Network Security, ACNS 2005, vol. 3531, pp. 91–103. Springer, Heidelberg (2005). https://doi.org/10.1007/11496137_7

    Chapter  Google Scholar 

  8. Rabkin, A.: Personal knowledge questions for fallback authentication: security questions in the era of Facebook. In: Proceedings of the 4th Symposium on Usable Privacy and Security, pp. 13–23 (2008)

    Google Scholar 

  9. Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., Downs, J.: Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 373–382 (2010)

    Google Scholar 

  10. Malkin, N., Mathur, A., Harbach, M., Egelman, S.: Personalized security messaging: nudges for compliance with browser warnings. In: 2nd European Workshop on Usable Security. Internet Society (2017)

    Google Scholar 

  11. Harris, M.A., Patten, K., Regan, E.: The need for BYOD mobile device security awareness and training. In: Proceedings of the Nineteenth Americas Conference on Information Systems (2013)

    Google Scholar 

  12. Caldwell, T.: Training–the weakest link. Comput. Fraud Secur. 9, 8–14 (2012)

    Article  Google Scholar 

  13. Franke, U., Brynielsson, J.: Cyber situational awareness – a systematic review of the literature. Comput. Secur. 46, 18–31 (2014)

    Article  Google Scholar 

  14. Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues Inf. Warfare Secur. Res. 1(1), 113–125 (2011)

    Google Scholar 

  15. Denis, C., Karsenty, L.: Inter-usability of multi-device systems: a conceptual framework. In: Multiple User Interfaces: Cross-Platform Applications and Context-Aware Interfaces, pp. 373–384 (2004)

    Google Scholar 

  16. Google Chrome Developers: Extensions and apps in the chrome web store. https://developer.chrome.com/docs/webstore/apps_vs_extensions/. Accessed 9 June 2021

  17. Rafailidis, D., Manolopoulos, Y.: Can virtual assistants produce recommendations? In: Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, pp. 1–6 (2019)

    Google Scholar 

  18. Shneiderman, B.: Human-centered artificial intelligence: three fresh ideas. AIS Trans. Hum.-Comput. Interact. 12(3), 109–124 (2020)

    Article  Google Scholar 

  19. Geiger, R.S.: Are computers merely “supporting” cooperative work?: towards an ethnography of bot development. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work Companion, pp. 51–56 (2013)

    Google Scholar 

  20. Friedman, V.: Privacy UX: Better notifications and permission requests. https://www.smashingmagazine.com/2019/04/privacy-better-notifications-ux-permission-requests/. Accessed 9 June 2021

  21. MacKenzie, I.S.: Fitts’ law as a research and design tool in human-computer interaction. Hum.-Comput. Interact. 7(1), 91–139 (1992)

    Article  Google Scholar 

  22. Proctor, R.W., Schneider, D.W.: Hick’s law for choice reaction time: a review. Q. J. Exp. Psychol. 71(6), 1281–1299 (2018)

    Article  Google Scholar 

  23. Kivetz, R., Urminsky, O., Zheng, Y.: The goal-gradient hypothesis resurrected: purchase acceleration, illusionary goal progress, and customer retention. J. Mark. Res. 43(1), 39–58 (2006)

    Article  Google Scholar 

  24. Endsley, M.R., Garland, D.J. (eds.): Situation Awareness Analysis and Measurement. CRC Press (2000)

    Google Scholar 

  25. Selcon, S.J., Taylor, R.M.: Evaluation of the situation awareness rating technique (SART) as a tool for aircrew systems design. Paper Presented at the AGARD AMP Symposium ‘Situational Awareness in Aerospace Operations’, Neuilly Sur Seine, France, pp. 23–52 (1990)

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by the Commonwealth Cyber Initiative, an investment in the advancement of cyber R&D, innovation and workforce development. For more information about CCI, visit cyberinitiative.org. We thank everyone at MI Technical Solutions for their involvement in identifying cyber hygiene concerns and technical constraints.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Janine D. Mator .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mator, J.D., Still, J.D. (2021). Impact of the Cyber Hygiene Intelligence and Performance (CHIP) Interface on Cyber Situation Awareness and Cyber Hygiene. In: Stephanidis, C., et al. HCI International 2021 - Late Breaking Papers: Design and User Experience. HCII 2021. Lecture Notes in Computer Science(), vol 13094. Springer, Cham. https://doi.org/10.1007/978-3-030-90238-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-90238-4_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-90237-7

  • Online ISBN: 978-3-030-90238-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics