{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:19:31Z","timestamp":1744258771587,"version":"3.40.4"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1564293"],"award-info":[{"award-number":["1564293"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Multimodal User Interfaces"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s12193-022-00397-z","type":"journal-article","created":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T09:02:41Z","timestamp":1667293361000},"page":"399-412","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks"],"prefix":"10.1007","volume":"16","author":[{"given":"Keith S.","family":"Jones","sequence":"first","affiliation":[]},{"given":"Natalie R.","family":"Lodinger","sequence":"additional","affiliation":[]},{"given":"Benjamin P.","family":"Widlus","sequence":"additional","affiliation":[]},{"given":"Akbar Siami","family":"Namin","sequence":"additional","affiliation":[]},{"given":"Emily","family":"Maw","sequence":"additional","affiliation":[]},{"given":"Miriam","family":"Armstrong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,1]]},"reference":[{"key":"397_CR1","unstructured":"United States Department of Homeland Security (2020) Homeland Threat Assessment. https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/2020_10_06_homeland-threat-assessment.pdf. Accessed 3 March 2021"},{"key":"397_CR2","unstructured":"Centers for Disease Control and Prevention (2021) COVID-19 Related Phone Scams and Phishing Attacks. https:\/\/www.cdc.gov\/media\/phishing.html. Accessed 3 March 2021"},{"key":"397_CR3","doi-asserted-by":"publisher","unstructured":"Siami Namin A, Hewett R, Jones KS, Pogrund R(2016) Sonifying internet security threats. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp.\u00a02306\u20132313. https:\/\/doi.org\/10.1145\/2851581.2892363","DOI":"10.1145\/2851581.2892363"},{"key":"397_CR4","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby M, Alaca F, Chiasson S (2015) Why phishing still works: User strategies for combating phishing attacks. Int J Hum Comput Stud 82:69\u201382. https:\/\/doi.org\/10.1016\/j.ijhcs.2015.05.005","journal-title":"Int J Hum Comput Stud"},{"key":"397_CR5","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-1-84800-211-1_13","volume-title":"Designing inclusive futures","author":"J Holman","year":"2008","unstructured":"Holman J, Lazar J, Feng J (2008) Investigating the security-related challenges of blind users on the Web. In: Langdon P, Clarkson J, Robinson P (eds) Designing inclusive futures. Springer, London, pp 129\u2013138"},{"key":"397_CR6","first-page":"28","volume":"19","author":"FA Inan","year":"2016","unstructured":"Inan FA, Namin AS, Pogrund RL, Jones KS (2016) Internet use and cybersecurity concerns of individuals with visual impairments. J Educational Technol Soc 19:28\u201340","journal-title":"J Educational Technol Soc"},{"key":"397_CR7","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1080\/10447310709336964","volume":"22","author":"J Lazar","year":"2007","unstructured":"Lazar J, Allen A, Kleinman J, Malarkey C (2007) What frustrates screen reader users on the Web: A study of 100 blind users. Int J Hum Comput Interact 22:247\u2013269. https:\/\/doi.org\/10.1080\/10447310709336964","journal-title":"Int J Hum Comput Interact"},{"issue":"4","key":"397_CR8","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s12193-015-0182-7","volume":"9","author":"\u00c1 Csap\u00f3","year":"2015","unstructured":"Csap\u00f3 \u00c1, Wers\u00e9nyi G, Nagy H, Stockman T (2015) A survey of assistive technologies and applications for blind users on mobile platforms: a review and foundation for research. J Multimodal User Interfaces 9(4):275\u2013286","journal-title":"J Multimodal User Interfaces"},{"key":"397_CR9","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s10209-007-0098-4","volume":"7","author":"E Murphy","year":"2008","unstructured":"Murphy E, Kuber R, McAllister G, Strain P, Yu W (2008) An empirical investigation into the difficulties experienced by visually impaired Internet users. Univ Access Inf Soc 7:79\u201391. https:\/\/doi.org\/10.1007\/s10209-007-0098-4","journal-title":"Univ Access Inf Soc"},{"key":"397_CR10","unstructured":"Zhao H, Plaisant C, Shneiderman B, Lazar J (2006) A framework for auditory data exploration and evaluation with geo-referenced data sonification. Manuscript under review"},{"key":"397_CR11","first-page":"9","volume-title":"The Sonification Handbook","author":"BN Walker","year":"2011","unstructured":"Walker BN, Nees MA (2011) Theory of Sonification. In: Hermann T, Hunt A, Neuhoff JG (eds) The Sonification Handbook. Logos Verlag, Berlin, Germany, pp 9\u201339"},{"key":"397_CR12","first-page":"135","volume-title":"The Routledge Companion to Sounding Art","author":"P Vickers","year":"2016","unstructured":"Vickers P (2016) Sonification and music, music and sonification. The Routledge Companion to Sounding Art. Routledge, London, pp 135\u2013144"},{"key":"397_CR13","first-page":"493","volume-title":"The Sonification Handbook","author":"A Guillaume","year":"2011","unstructured":"Guillaume A (2011) Intelligent auditory alarms. In: Hermann T, Hunt A, Neuhoff JG (eds) The Sonification Handbook. Logos Verlag, Berlin, Germany, pp 493\u2013508"},{"issue":"2","key":"397_CR14","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s12193-020-00319-x","volume":"14","author":"AL Aldana Blanco","year":"2020","unstructured":"Aldana Blanco AL, Grautoff S, Hermann T (2020) ECG sonification to support the diagnosis and monitoring of myocardial infarction. J Multimodal User Interfaces 14(2):207\u2013218","journal-title":"J Multimodal User Interfaces"},{"key":"397_CR15","unstructured":"Hermann T, Drees JM, Ritter H(2003) Broadcasting auditory weather reports \u2013 a pilot project. In Brazil E, Shinn- Cunningham B (eds) Proceedings of the 2003 International Conference on Auditory Display. Boston University Publications Production Department, Boston, pp.\u00a0208\u2013211"},{"key":"397_CR16","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/292834.292839","volume":"5","author":"SA Brewster","year":"1998","unstructured":"Brewster SA (1998) Using non-speech sounds to provide navigation cues. ACM Trans Computer-Human Interact 5:224\u2013259. https:\/\/doi.org\/10.1145\/292834.292839","journal-title":"ACM Trans Computer-Human Interact"},{"key":"397_CR17","doi-asserted-by":"publisher","unstructured":"Ma X, Fellbaum C, Cook PR(2010) SoundNet: Investigating a language composed of environmental sounds. In: CHI 2010: Proceedings of the SIGCHI Conference on Huma Factors in Computing Systems. ACM, pp.\u00a01945\u20131954. https:\/\/doi.org\/10.1145\/1753326.1753620","DOI":"10.1145\/1753326.1753620"},{"key":"397_CR18","doi-asserted-by":"crossref","unstructured":"Gaver WW, Smith RB, O\u2019Shea T(1991) Effective sounds in complex systems: The arkola simulation. In: Proceedings of CHI. ACM, New York, pp.\u00a085\u201390","DOI":"10.1145\/108844.108857"},{"issue":"3","key":"397_CR19","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s12193-018-0282-2","volume":"13","author":"T Ziemer","year":"2019","unstructured":"Ziemer T, Schultheis H (2019) Psychoacoustic auditory display for navigation: an auditory assistance system for spatial orientation tasks. J Multimodal User Interfaces 13(3):205\u2013218","journal-title":"J Multimodal User Interfaces"},{"issue":"3","key":"397_CR20","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s12193-018-0281-3","volume":"13","author":"P Skulimowski","year":"2019","unstructured":"Skulimowski P, Owczarek M, Radecki A, Bujacz M, Rzeszotarski D, Strumillo P (2019) Interactive sonification of U-depth images in a navigation aid for the visually impaired. J Multimodal User Interfaces 13(3):219\u2013230","journal-title":"J Multimodal User Interfaces"},{"issue":"3","key":"397_CR21","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s12193-011-0065-5","volume":"5","author":"D El-Shimy","year":"2012","unstructured":"El-Shimy D, Grond F, Olmos A, Cooperstock JR (2012) Eyes-free environmental awareness for navigation. J Multimodal User Interfaces 5(3):131\u2013141","journal-title":"J Multimodal User Interfaces"},{"issue":"2","key":"397_CR22","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s12193-020-00322-2","volume":"14","author":"J Newbold","year":"2020","unstructured":"Newbold J, Gold NE, Bianchi-Berthouze N (2020) Movement sonification expectancy model: leveraging musical expectancy theory to create movement-altering sonifications. J Multimodal User Interfaces 14(2):153\u2013166","journal-title":"J Multimodal User Interfaces"},{"key":"397_CR23","doi-asserted-by":"crossref","unstructured":"Horsak, B., Dlapka, R., Iber, M., Gorgas, A. M., Kiselka, A., Gradl, C., \u2026 Doppler,J. (2016). SONIGait: a wireless instrumented insole device for real-time sonification of gait. Journal on Multimodal User Interfaces, 10(3), 195\u2013206","DOI":"10.1007\/s12193-016-0216-9"},{"issue":"3","key":"397_CR24","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s12193-016-0218-7","volume":"10","author":"B Stahl","year":"2016","unstructured":"Stahl B, Thoshkahna B (2016) Design and evaluation of the effectiveness of a sonification technique for real time heart-rate data. J Multimodal User Interfaces 10(3):207\u2013219","journal-title":"J Multimodal User Interfaces"},{"issue":"3","key":"397_CR25","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s12193-011-0085-1","volume":"5","author":"G Dubus","year":"2012","unstructured":"Dubus G (2012) Evaluation of four models for the sonification of elite rowing. J Multimodal User Interfaces 5(3):143\u2013156","journal-title":"J Multimodal User Interfaces"},{"issue":"3","key":"397_CR26","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s12193-018-0283-1","volume":"13","author":"V Lorenzoni","year":"2019","unstructured":"Lorenzoni V, Van den Berghe P, Maes PJ, De Bie T, De Clercq D, Leman M (2019) Design and validation of an auditory biofeedback system for modification of running parameters. J Multimodal User Interfaces 13(3):167\u2013180","journal-title":"J Multimodal User Interfaces"},{"issue":"4","key":"397_CR27","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s12193-018-0264-4","volume":"13","author":"E Frid","year":"2019","unstructured":"Frid E, Moll J, Bresin R, Salln\u00e4s Pysander EL (2019) Haptic feedback combined with movement sonification using a friction sound improves task performance in a virtual throwing task. J Multimodal User Interfaces 13(4):279\u2013290","journal-title":"J Multimodal User Interfaces"},{"issue":"7","key":"397_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-021-04703-4","volume":"3","author":"P Datta","year":"2021","unstructured":"Datta P, Namin AS, Jones KS, Hewett R (2021) Warning users about cyber threats through sounds. SN Appl Sci 3(7):1\u201321","journal-title":"SN Appl Sci"},{"key":"397_CR29","doi-asserted-by":"publisher","unstructured":"Bartsch S, Volkamer M, Theuerling H, Karayumak F(2013) Contextualized web warnings and how they cause distrust. In: Huth M, Asokan N, Capkun S, Flechais I, Coles-Kemp L (eds) International Conference on Trust and Trustworthy Computing, Springer, Berlin, Heidelberg, pp.\u00a0205\u2013222. https:\/\/doi.org\/10.1007\/978-3-642-38908-5_16","DOI":"10.1007\/978-3-642-38908-5_16"},{"key":"397_CR30","unstructured":"Kauer M, Pfeiffer T, Volkamer M, Theuerling H, Bruder R (2012) It is not about the design \u2013 it is about the content! Making warnings more efficient by communicating risks appropriately. GI-Edition \u2013 Lecture Notes in Informatics"},{"key":"397_CR31","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.chb.2016.11.044","volume":"68","author":"M Dodel","year":"2017","unstructured":"Dodel M, Mesch G (2017) Cyber-victimization preventive behavior: a health belief model approach. Comput Hum Behav 68:359\u2013367. https:\/\/doi.org\/10.1016\/j.chb.2016.11.044","journal-title":"Comput Hum Behav"},{"key":"397_CR32","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","volume":"46","author":"B Ng","year":"2009","unstructured":"Ng B, Kankanhalli A, Xu Y (2009) Studying users\u2019 computer security behavior: a health belief perspective. Decis Support Syst 46:815\u2013825. https:\/\/doi.org\/10.1016\/j.dss.2008.11.010","journal-title":"Decis Support Syst"},{"key":"397_CR33","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1080\/09720510.2019.1580907","volume":"22","author":"B Narwal","year":"2019","unstructured":"Narwal B, Mohapatra AK, Usmani KA (2019) Towards a taxonomy of cyber threats against target applications. J Stat Manage Syst 22:301\u2013325. https:\/\/doi.org\/10.1080\/09720510.2019.1580907","journal-title":"J Stat Manage Syst"},{"key":"397_CR34","unstructured":"Federal Bureau of Investigation (2021) The Cyber Threat. https:\/\/www.fbi.gov\/investigate\/cyber. Accessed 3 March 2021"},{"key":"397_CR35","unstructured":"Federal Bureau of Investigation (2021) Ransomware. https:\/\/www.fbi.gov\/scams-and-safety\/common-scams-and-crimes\/ransomware. Accessed 3 March 2021"},{"key":"397_CR36","unstructured":"Bartsch S, Volkamer M (2013) Effectively communicate risks for diverse users: A mental-models approach for individualized security interventions. Informatik 2013 \u2013 informatic angepasst an Mensch, Organisation und Umwelt. Boon, Gesellschaft Fur Informatik e.V., pp 1971\u20131984"},{"key":"397_CR37","unstructured":"Optimal Workshop Ltd (2021) https:\/\/www.optimalworkshop.com"},{"key":"397_CR38","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1111\/j.1469-8137.1912.tb05611.x","volume":"11","author":"P Jaccard","year":"1912","unstructured":"Jaccard P (1912) The distribution of the flora in the alpine zone. New Phytol 11:37\u201350. https:\/\/doi.org\/10.1111\/j.1469-8137.1912.tb05611.x","journal-title":"New Phytol"},{"key":"397_CR39","volume-title":"Finding groups in data: An introduction to cluster analysis","author":"L Kaufman","year":"2009","unstructured":"Kaufman L, Rousseeuw PJ (2009) Finding groups in data: An introduction to cluster analysis. John Wiley & Sons, Hoboken"},{"key":"397_CR40","unstructured":"MacQueen J(1967) Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, pp.\u00a0281\u2013297"},{"key":"397_CR41","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"PJ Rousseeuw","year":"1987","unstructured":"Rousseeuw PJ (1987) Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J Comput Appl Math 20:53\u201365. https:\/\/doi.org\/10.1016\/0377-0427(87)90125-7","journal-title":"J Comput Appl Math"},{"key":"397_CR42","doi-asserted-by":"publisher","first-page":"218","DOI":"10.22237\/jmasm\/1051748460","volume":"2","author":"SS Sawilowsky","year":"2003","unstructured":"Sawilowsky SS (2003) You think you\u2019ve got trivials? J Mod Appl Stat Methods 2:218\u2013225. https:\/\/doi.org\/10.22237\/jmasm\/1051748460","journal-title":"J Mod Appl Stat Methods"},{"key":"397_CR43","first-page":"1","volume":"140","author":"R Likert","year":"1932","unstructured":"Likert R (1932) A technique for the measurement of attitudes. Archives of Psychology 140:1\u201355","journal-title":"Archives of Psychology"},{"key":"397_CR44","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.jrp.2004.09.009","volume":"39","author":"JA Johnson","year":"2005","unstructured":"Johnson JA (2005) Ascertaining the validity of individual protocols from web-based personality inventories. J Res Personality 39:103\u2013129. https:\/\/doi.org\/10.1016\/j.jrp.2004.09.009","journal-title":"J Res Personality"},{"key":"397_CR45","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1250\/ast.28.360","volume":"28","author":"S Kuwano","year":"2007","unstructured":"Kuwano S, Namba S, Schick A et al (2007) Subjective impression of auditory danger signals in different countries. Acoust Sci & Tech 28:360\u2013362. https:\/\/doi.org\/10.1250\/ast.28.360","journal-title":"Acoust Sci & Tech"},{"key":"397_CR46","unstructured":"Wash R, Rader E(2015) Too much knowledge? Security beliefs and protective behaviors among United States Internet Users. In: SOUPS. The USENIX Association, pp.\u00a0309\u2013325"},{"issue":"2","key":"397_CR47","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s12193-020-00318-y","volume":"14","author":"S Roddy","year":"2020","unstructured":"Roddy S, Bridges B (2020) Mapping for meaning: the embodied sonification listening model and its implications for the mapping problem in sonic information design. J Multimodal User Interfaces 14(2):143\u2013151","journal-title":"J Multimodal User Interfaces"},{"issue":"3","key":"397_CR48","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s12193-016-0223-x","volume":"10","author":"F Tordini","year":"2016","unstructured":"Tordini F, Bregman AS, Cooperstock JR (2016) Prioritizing foreground selection of natural chirp sounds by tempo and spectral centroid. J Multimodal User Interfaces 10(3):221\u2013234","journal-title":"J Multimodal User Interfaces"}],"container-title":["Journal on Multimodal User Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12193-022-00397-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12193-022-00397-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12193-022-00397-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:53:14Z","timestamp":1744206794000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12193-022-00397-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["397"],"URL":"https:\/\/doi.org\/10.1007\/s12193-022-00397-z","relation":{},"ISSN":["1783-7677","1783-8738"],"issn-type":[{"type":"print","value":"1783-7677"},{"type":"electronic","value":"1783-8738"}],"subject":[],"published":{"date-parts":[[2022,11,1]]},"assertion":[{"value":"3 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/Competing interests"}},{"value":"The university Institutional Review Board approved this study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All participants provided informed consent to participate.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors agree to the publication of this paper.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}