Fighting email phishing attacks utilizing brand icon (Favicon) : An Empirical Research

Authors

  • Jerry Pullan  Nova Southeastern University, College of Computing and Engineering, Fort Lauderdale, Florida, USA
  • Eidan J. Rosado  Nova Southeastern University, College of Computing and Engineering, Fort Lauderdale, Florida, USA
  • Allen Anand  Albertian Institute of Science & Technology, Department of Computer science & Engineering, Kochi, Kerala, India

DOI:

https://doi.org/10.32628/IJSRSET21821

Keywords:

Phishing, Human-Computer Interaction, HCI, Think aloud, Heuristic Evaluation, Favicon, email, Gmail, webmail, Security, Spam.

Abstract

The release of tablets and smartphones, which offer more advanced communication and computing capabilities, has led to the strong emergence of communication media on the market. Email systems are continuously being improved. In addition to facilitating communication between businesses and customers, users and businesses are proposing new communication methods such as App-based chat and instant messengers. Nevertheless, email is still the most popular means of communication in use. Google’s Gmail is one of the most widely used email service applications in the email market. It is top-notch at filtering out spam and offers useful extras such as quick links to track deliveries, amend reservations, and more without opening the email and looking for a link. Google has interpreted “know your user” and designed a system that can be accessed even by the novice computer user [1]. As of May 2016, Google announced in their I/O Developers Conference that Gmail now has more than 1.5 billion monthly active users, giving Gmail the largest email user base [2]. Usability becomes a key factor in the adoption of these applications, which are often used by people who have problems when using mobile devices, spammers and hackers, and those who have limited experience with technology. The aim of this paper is to conduct an empirical study to evaluate the Gmail Sender’s Icon feature to stop phishing. The result of the study will provide recommendations that may help improve the efficiency and effectiveness of email communication and avoid phishing, scam.

References

  1. Norman, D. A. (2005). Human-centered design considered harmful. interactions, 12(4), 14-19.
  2. Lardinois, F. (2016, February 01). Gmail Now Has More Than 1B Monthly Active Users. Retrieved April 01, 2017, from https://techcrunch.com/2016/02/01/gmail-now-has-more-than-1b-monthly-active-users/
  3. Whittaker, S., & Sidner, C. (1996, April). Email overload: exploring personal information management of email. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 276-283). ACM.
  4. Marulanda-Carter, L., & Jackson, T. W. (2012). Effects of e-mail addiction and interruptions on employees. Journal of Systems and Information Technology, 14(1), 82-94.
  5. Agarwal, A. (2017) "See the Email Sender’s Company and Logo in Your Gmail Inbox." Digital Inspiration. Amit Agarwal, 13 Feb. 2017. Web. 14 Apr. 2017.
  6. Greenberg, S., & Buxton, B. (2008, April). Usability evaluation considered harmful (some of the time). In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 111-120). ACM.
  7. Molich, R., & Nielsen, J. (1990). Improving a human-computer dialogue. Communications of the ACM, 33(3), 338-348.
  8. Fernandez, A., Insfran, E., & Abrahão, S. (2011). Usability evaluation methods for the web: A systematic mapping study. Information and Software Technology, 53(8), 789-817.
  9. Rubin, J., & Chisnell, D. (2008). Handbook of usability testing: how to plan, design and conduct effective tests. John Wiley & Sons.
  10. Jerry, M. P. (2016). Community College Development in India: Variations in the Reception and Translation of the US Community College Model by Indian Administrators to Suit Indian Contexts.
  11. Nielsen, J. (2015). How to conduct a heuristic evaluation. 1995. Nielsen Norman Group.
  12. Marcus, A. (Ed.). (2015). Design, User Experience, and Usability: Interactive Experience Design: 4th International Conference, DUXU 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015, Proceedings (Vol. 9188). Springer.
  13. Ramey, J., Boren, T., Cuddihy, E., Dumas, J., Guan, Z., Van den Haak, M. J., & De Jong, M. D. (2006, April). Does think aloud work?: how do we know?. In CHI'06 Extended Abstracts on Human Factors in Computing Systems (pp. 45-48). ACM.
  14. Nielsen, J. (1995). Severity ratings for usability problems. Papers and Essays, 54, 1-2.
  15. Nielsen, J. (1995). 10 usability heuristics for user interface design. Nielsen Norman Group, 1(1).
  16. Nielsen, J. (1994). Enhancing the explanatory power of usability heuristics. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems (pp. 152-158). ACM.
  17. Wilson, C. E. (2007). The problem with usability problems: Context is critical. interactions, 14(5), 46-ff.
  18. Usability.gov Consent Form (Adult). (2013, October 15). Retrieved April 1, 2019, from https://www.usability.gov/how-to-and-tools/resources/templates/consent-form-adult.html

Downloads

Published

2020-02-28

Issue

Section

Research Articles

How to Cite

[1]
Jerry Pullan, Eidan J. Rosado, Allen Anand "Fighting email phishing attacks utilizing brand icon (Favicon) : An Empirical Research" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 1, pp.287-298, January-February-2021. Available at doi : https://doi.org/10.32628/IJSRSET21821