Yukiko Sawaya’s research while affiliated with KDDI Research and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (23)


Does the Anchoring Effect Influence Individuals’ Anti-phishing Behavior Intentions?
  • Chapter

April 2024

·

6 Reads

Lecture Notes in Computer Science

Yukiko Sawaya

·

Ayane Sano

·

Takamasa Isohara

·

[...]

·

Ayako Komatsu

Messages and Incentives to Promote Updating of Software on Smartphones

April 2024

·

19 Reads

To improve the rate of taking security action, it is important to promote personalized approaches for each user. Related works indicate phrases and UIs of dialog messages and incentives that influence a user’s action. In our previous work, we focused on smartphone users updating software, and proposed appropriate phrases of dialog messages according to the user’s understanding of the updating procedure, as well as the type of software. We also analyzed appropriate incentives. However, in the terms of level of literacy, the effectiveness of the UI of dialog messages and the volume of incentives remain unclear. In this paper, we conducted a user survey to analyze appropriate UIs according to the user’s understanding of the updating procedure and the appropriate volume of incentives. As a result, we confirmed different UIs are effective according to the user’s understanding of the updating procedure. In addition, we found an appropriate volume of points, mobile data, and coupons in order to promote the updating of software.



Proposal for Approaches to Updating Software on Android Smartphone

October 2023

·

37 Reads

·

1 Citation

It is important to provide personalized interventions that focus on the different security awareness of each user. We focus on updating operating system (OS) and seven major types of applications (Communication, Finance, Lifestyle, Games, Utility, Health, Entertainment) for smartphone users and aim to provide approaches that lead to updating of OS and seven types of applications (hereinafter, this is called “software”). We consider that user awareness of updating software may differ, and this relates to user understanding of the updating procedure. In this paper, we propose intervention methods according to users’ knowledge about update procedures. We conduct an online survey to evaluate effective approaches such as dialog message and type of incentive that increases the intention of smartphone users to update. We found that effective phrases of dialog messages differ according to the users’ understanding of the update procedures and that reward points are the best incentive for many users.


Human Factors Impacting the Security Actions of Help Recipients

October 2023

·

3 Reads

Some users (“Help recipients”) delegate necessary security actions to their family, friends, or others close to them. It is important to be able to take appropriate defensive actions against security threats by themselves when help is not available from neighbors (“Helpers”). In this paper, we interviewed 9 users who used to be Help recipients, but who have now started to take security actions by themselves. We investigated the reason why Help recipients delegated their security actions to Helpers and the human factors that have an impact when one takes security actions by oneself. As a result, Help recipients take their own security actions when they try new hobbies or feel a sense of ownership. Based on these findings, we classify Help recipients into four groups and propose an optimized system that shows security action lists according to user situation. These findings are useful when providing appropriate intervention for Help recipients.




SeBeST: Security Behavior Stage Model and Its Application to OS Update

April 2021

·

52 Reads

·

5 Citations

To protect computers from various types of cyberattack, users are required to learn appropriate security behaviors. Different persuasion techniques to encourage users to take security behaviors are required according to user attitude toward security. In this paper, we first propose a Security Behavior Stage Model (SeBeST) which classifies users into five stages in terms of attitude toward security measurements; having security awareness and taking security behaviors. In addition, we focus on OS updating behaviors as an example of security behaviors and evaluated effective OS update messages for users in each stage. We create message dialogs which can promote user OS updating behaviors. We conduct two online surveys; we analyze the validity of SeBeST in Survey1 and then evaluate effective messages for each stage in Survey2. We find that SeBeST has high validity and appropriate messages for the users in each stage differ from one another.


Human Factors in Homograph Attack Recognition

August 2020

·

35 Reads

·

5 Citations

Lecture Notes in Computer Science

Homograph attack is a way that attackers deceive victims about which website domain name they are communicating with by exploiting the fact that many characters look alike. The attack becomes serious and is raising broad attention when recently many brand domains have been attacked such as Apple Inc., Adobe Inc., Lloyds Bank, etc. We first design a survey of human demographics, brand familiarity, and security backgrounds and apply it to 2,067 participants. We build a regression model to study which factors affect participants’ ability in recognizing homograph domains. We find that for different levels of visual similarity, the participants exhibit different abilities. 13.95% of participants can recognize non-homographs while 16.60% of participants can recognize homographs whose the visual similarity with the target brand domains is under 99.9%; but when the similarity increases to 99.9%, the number of participants who can recognize homographs significantly drops down to only 0.19%; and for the homographs with 100% of visual similarity, there is no way for the participants to recognize. We also find that female participants tend to recognize homographs better the male but male participants tend to able to recognize non-homographs better than females. Security knowledge is a significant factor affecting both homographs and non-homographs; surprisingly, people who have strong security knowledge tend to be able to recognize homographs but not non-homographs. Furthermore, people who work or are educated in computer science or computer engineering do not appear as a factor affecting the ability in recognizing homographs; however, interestingly, right after they are explained about the homograph attack, people who work or are educated in computer science or computer engineering are the ones who can capture the situation the most quickly.


Human Factors in Homograph Attack Recognition

April 2020

·

152 Reads

·

2 Citations

Homograph attack is a way that attackers deceive victims about which website domain name they are communicating with by exploiting the fact that many characters look alike. The attack becomes serious and is raising broad attention when recently many brand domains have been attacked such as Apple Inc., Adobe Inc., Lloyds Bank, etc. We first design a survey of human demographics, brand familiarity, and security backgrounds and apply it to 2,067 participants. We build a regression model to study which factors affect participants' ability in recognizing homograph domains. We find that for different levels of visual similarity, the participants exhibit different abilities. 13.95% of participants can recognize non-homographs while 16.60% of participants can recognize homographs whose the visual similarity with the target brand domains is under 99.9%; but when the similarity increases to 99.9%, the number of participants who can recognize homographs significantly drops down to only 0.19%; and for the homographs with 100% of visual similarity, there is no way for the participants to recognize. We also find that female participants tend to recognize homographs better the male but male participants tend to able to recognize non-homographs better than females. Security knowledge is a significant factor affecting both homographs and non-homographs; surprisingly, people who have strong security knowledge tend to be able to recognize homographs but not non-homographs. Furthermore, people who work or are educated in computer science or computer engineering do not appear as a factor affecting the ability in recognizing homographs; however, interestingly, right after they are explained about the homograph attack, people who work or are educated in computer science or computer engineering are the ones who can capture the situation the most quickly.


Citations (12)


... In security and privacy, Sano et al. [49,50], Faklaris et al. [30], and Ting et al. [55] have explored applying the Stages of Change and Processes of Change to end user studies. These researchers identified a theoretical and/or empirical basis for classifying computer users by whether they are in either precontemplation (Stage 1), contemplation/preparation (Stages 2-3), or action/maintenance (Stages 4-5) of adopting practices such as updating their operating systems, checking for https in URLs, and using antivirus software. ...

Reference:

Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption
Designing Personalized OS Update Message based on Security Behavior Stage Model
  • Citing Conference Paper
  • December 2021

... In security and privacy, Sano et al. [49,50], Faklaris et al. [30], and Ting et al. [55] have explored applying the Stages of Change and Processes of Change to end user studies. These researchers identified a theoretical and/or empirical basis for classifying computer users by whether they are in either precontemplation (Stage 1), contemplation/preparation (Stages 2-3), or action/maintenance (Stages 4-5) of adopting practices such as updating their operating systems, checking for https in URLs, and using antivirus software. ...

SeBeST: Security Behavior Stage Model and Its Application to OS Update
  • Citing Chapter
  • April 2021

... As an example of the homoglyph, they are using the Cyrillic small letter "o" instead of the ASCII "o". According to [3], phishing victims by clicking a message has been increasing, just as phishing for credentials from specific services where a single letter from the DNS domain is replaced by a similar character that looks the same. ...

Human Factors in Homograph Attack Recognition
  • Citing Chapter
  • August 2020

Lecture Notes in Computer Science

... They divided the URLs by the structure of URL protocol, subdomain name, domain name, domain suffix, and URL path 5 parts. The method proposed by Kaneko et al. [10] named "Detecting Malicious Websites by Query Templates"used the machine learning algorithm DBSCAN to cluster malicious URLs and benign URLs. In the segmentation step, they chose a different way to divide URLs is that use all delimiters into URLs. ...

Detecting Malicious Websites by Query Templates
  • Citing Chapter
  • February 2020

Lecture Notes in Computer Science

... Several homograph detections have been proposed. While most of the papers focus on IDNs, a state-of-the-art paper [2] can thoroughly deal with the homographs not just in IDNs but also in English domains. Instead of determining the homographs by picking the domains with visual similarity scores greater than a fixed threshold, the authors proposed a machine learning-based classification using the visual similarity as features to address the high false-positive rate caused by the fixed similarity threshold. ...

Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack
  • Citing Chapter
  • June 2019

IFIP Advances in Information and Communication Technology

... Hence, we chose to remove them from the relative comparison table as more research work where various machine learning algorithms are used to detect drive-by download attack are still required. We don't know why the detection of drive-by download attacks using machine learning algorithms is so scanty, and so this is open for [1], [81], [26], [12], [83], [55] 88.69 Naive Bayes [56], [1], [47], [103], [77], [92] 87.37 Random Forest [1], [12], [83], [55], [77], [23] 91.83 Decision Tree [1], [40], [60], [55], [103], [34] 91.85 KNN [81], [55], [103], [77], [92], [74] 92.22 Logistic Regression [81], [55], [77], [34], [27], [109] 92 .76 investigation and further research. ...

Classification of Landing and Distribution Domains Using Whois’ Text Mining
  • Citing Conference Paper
  • Full-text available
  • August 2017

... The full questionnaire can be accessed online. 2 Recruitment and data collection. We decided to partner with Qualtrics, a reputable panel provider also used in prior work [10,49], for our recruitment. We targeted our survey to individuals 18 years or older whose country of origin and current residence is one of the following: Bangladesh, India, Pakistan, and the United States. ...

Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior
  • Citing Conference Paper
  • May 2017

... Fan et al. adopted a multilevel hierarchical ID method based on GA (genetic algorithm) to solve the problems of a single-level ID system [9]. Ghosh et al. proposed a method of constructing an ID system with a decision tree, which can identify unknown attacks in the network [10]. Alotaibi and Alotaibi proposed an abnormal traffic detection method based on a deep neural network, which can identify the normal or abnormal connections in the network, and the detection effect is good [11]. ...

Managing High Volume Data for Network Attack Detection Using Real-Time Flow Filtering

China Communications