{"id":"https://openalex.org/W2901310212","doi":"https://doi.org/10.1145/3243734.3278495","title":"Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen Readers","display_name":"Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen Readers","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2901310212","doi":"https://doi.org/10.1145/3243734.3278495","mag":"2901310212"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3278495","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3278495","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069647574","display_name":"Daniela Napoli","orcid":"https://orcid.org/0009-0009-2125-7036"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Daniela Napoli","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048641215","display_name":"Sonia Chiasson","orcid":"https://orcid.org/0000-0001-7314-2198"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Sonia Chiasson","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069647574"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.16499774,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"2252","last_page":"2254"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12481","display_name":"Digital Accessibility for Disabilities","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/3307","display_name":"Human Factors and Ergonomics"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/screen-reader","display_name":"Screen reader","score":0.8554364442825317},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.758186936378479},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7044203281402588},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.5705916285514832},{"id":"https://openalex.org/keywords/tweaking","display_name":"Tweaking","score":0.5326886773109436},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5204484462738037},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.4696005582809448},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.46560508012771606},{"id":"https://openalex.org/keywords/comprehension","display_name":"Comprehension","score":0.4556449353694916},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.4480654001235962},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.44418686628341675},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4374575912952423},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.42265868186950684},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.40732789039611816},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.38889995217323303},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35371506214141846},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2817276120185852},{"id":"https://openalex.org/keywords/visually-impaired","display_name":"Visually impaired","score":0.184798002243042},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1454589068889618}],"concepts":[{"id":"https://openalex.org/C2778535757","wikidata":"https://www.wikidata.org/wiki/Q1328864","display_name":"Screen reader","level":3,"score":0.8554364442825317},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.758186936378479},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7044203281402588},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.5705916285514832},{"id":"https://openalex.org/C2780200862","wikidata":"https://www.wikidata.org/wiki/Q4453309","display_name":"Tweaking","level":2,"score":0.5326886773109436},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5204484462738037},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.4696005582809448},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.46560508012771606},{"id":"https://openalex.org/C511192102","wikidata":"https://www.wikidata.org/wiki/Q5156948","display_name":"Comprehension","level":2,"score":0.4556449353694916},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.4480654001235962},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.44418686628341675},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4374575912952423},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.42265868186950684},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40732789039611816},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.38889995217323303},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35371506214141846},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2817276120185852},{"id":"https://openalex.org/C3020106864","wikidata":"https://www.wikidata.org/wiki/Q737460","display_name":"Visually impaired","level":2,"score":0.184798002243042},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1454589068889618},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3243734.3278495","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3278495","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2005062613","https://openalex.org/W2023105570","https://openalex.org/W2061639962","https://openalex.org/W2131906261","https://openalex.org/W2139179587","https://openalex.org/W2168735851","https://openalex.org/W2350778671","https://openalex.org/W2509502619","https://openalex.org/W2624735790"],"related_works":["https://openalex.org/W4241780599","https://openalex.org/W2968428037","https://openalex.org/W1981619058","https://openalex.org/W4244708442","https://openalex.org/W2152101763","https://openalex.org/W4323777416","https://openalex.org/W2505446473","https://openalex.org/W2057518680","https://openalex.org/W4394339218","https://openalex.org/W2738037186"],"abstract_inverted_index":{"Effective":[0],"SSL":[1,67],"warnings":[2,42,81],"can":[3],"point":[4],"out":[5],"network":[6],"attacks":[7],"or":[8,99],"potential":[9,109],"phishing":[10],"sites.":[11],"Much":[12],"focus":[13],"has":[14],"been":[15],"placed":[16],"on":[17],"tweaking":[18],"text,":[19],"colours,":[20],"and":[21,27,64,72],"symbols":[22],"to":[23],"improve":[24],"users'":[25],"comprehension":[26],"adhesion.":[28],"These":[29],"optimized":[30],"visualizations":[31],"do":[32,91],"not":[33,92],"necessarily":[34],"aid":[35],"people":[36],"with":[37,70,85,115],"visual":[38],"disabilities":[39],"who":[40],"hear":[41],"rather":[43],"than":[44],"see":[45],"them.":[46],"To":[47],"assess":[48],"the":[49,106],"non-visual":[50,110],"aspects":[51],"of":[52,61,108],"these":[53],"security":[54],"warnings,":[55],"we":[56],"conducted":[57],"an":[58],"expert":[59],"evaluation":[60],"Google":[62],"Chrome":[63],"Mozilla":[65],"Firefox's":[66],"certificate":[68],"dialogues":[69],"JAWS":[71],"Apple":[73],"VoiceOver":[74],"screen":[75,118],"readers.":[76],"Our":[77],"findings":[78],"suggest":[79],"that":[80],"are":[82],"mostly":[83],"unreadable":[84],"assistive":[86],"technology":[87],"and,":[88],"when":[89],"accessible,":[90],"effectively":[93],"describe":[94],"threat":[95],"sources,":[96],"at-risk":[97],"data,":[98],"false":[100],"positives.":[101],"Future":[102],"work":[103],"will":[104],"explore":[105],"effectiveness":[107],"redesigns":[111],"through":[112],"usability":[113],"studies":[114],"visually":[116],"impaired":[117],"reader":[119],"users.":[120]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
