**2. Human machine interfaces**

Human Machine Interfaces (HMI) deals with the study of two-way transmission of records among users and machines, which establishes a relationship with the user and create user experience [13]. It is natural for individuals to be proud of whatever they produce, no matter how simple it is or complicated as an HMI. Poor HMI designs have been seen as variables contributing to anomalous circumstances and thus exposing the design to cyber security threats. If the principles and practices of HMI are followed, the following are expected to be achieved for the design to be user-centered design:


If all these principles and practices are followed, they will improve the cyber security process, but regrettably, various HMIs designs were created with little human input, hence they are technology-centered and are not achieving the desired results. If the aim and the responsibilities of the users are considered with competence, attack threats will reduce. Also, consideration of the user's mode of processing information and decision making must be built into interface design. The successful application of baseline principles leads to trust and the level of trust the users have in a design will govern how they use it. For instance, if a user does not trust a site, he/she will not supply credit card details. If these principles are violated it can lead to credit card hacking. **Table 1** shows the relationship between poor HMI and effective HMI.


#### **Table 1.**

*Characteristics of poor and effective HMI.*

Intelligent HMI or HCI can help reduce security problem. A typical example of a security threat in the cyber space is phishing. Many phishing web pages are merely clones of actual sites with minor skewed or masqueraded elements in certain instances. These phishing sites' properties have made Intelligent HMI or HCI problematic for system users as well as several anti-phishing strategies to spot them. Attackers have been able to respond rapidly to anti-phishing initiatives that limits the efficacy of phishing attempts and defend unsuspecting users. Despite the impressive strides made by anti-phishing systems, in recent years, this assault remains one of the most successful. An IUI can be used to reduce the efficacy of phishing attacks and improve consumer understanding of associated threats. Using AI, the interface not only informs the user that there is a phishing attack but also discuss reasons why the website is a phishing site. Such a system is proposed in [14].

#### **2.1 User Interface**

User Interface (UI) allows the user to control software applications or hardware devices thus allowing the user have an interaction with the software or hardware of any device especially computing devices. User interfaces are available for both hardware and software devices. A typical example of a hardware device with user interface is the remote control; it has several buttons and sometimes screen to display some basic information. However, the buttons can be used by the user to tell the hardware what to do or what operations to perform. For instance, the use of a keyboard and mouse, each of which has its own user interface, to run a software program. Similarly, through the on-screen menus, a program graphical user interface, can be used to operate a digital camera. According to [15] the aim of a successful user interface, regardless of the program, is to be user-friendly.

UI focus on the looks and styles and it serves as the access point where the user interacts with the designs and system functionalities. UI comes in three forms such as Graphical User Interfaces (GUI), Voice-Controlled User Interfaces (VUI) and Gesture- Based User Interfaces (GbUI) [16]. The GUI allow users to interact with the visual representations of a digital control panel or system. Typical examples are the computer desktops and mobile phone screens. Unlike the GUI, the VUI allow users to interact with the systems and components via voices and speeches. Typical examples are the Google Assistant on Google devices, Siri on IoS devices and Alexa on Amazon devices. The VUI are rampant with more intelligent systems as there is need for a high level of voice recognition and speech processing. For Gesture- Based User Interfaces, the user gets more engaged in the three-dimensional (3-D) space and uses gestures, most especially hand gestures, in interacting with the system. These types of interfaces are mostly used in virtual reality spaces. Three key elements in UI include input control, navigational control and the informational component. Integration of cyber threat related feedback to UI for automated sentiment analysis of the system will aid qualifying potentially new type of attacks or threats.

#### **2.2 User experience**

Unlike the UI, that focuses on interfaces, the User Experience (UX) describes and centers on the user's experience of an interaction with the system. Interaction tends to be broader than interfaces as it facilitates dialog and communication between the user and the computing device. The Interfaces are used to experience interactions. Three major dimensions in UX are the users, products and interactions. UX helps to provide a simple way to analyze user product interactions and what influences them. The experience derived from the user product interaction at a given time and

*Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling DOI: http://dx.doi.org/10.5772/intechopen.96534*

in particular conditions is regarded as UX [17]. It is the individual perception that results from the use or anticipated use of a product/service or system.

UX deals with analysis, experimentation, creation, content, and prototyping, whereas UI is a method of visually leading the consumer through all devices via the interface of a product utilizing interactive elements including cyber threat modeling. To solve a dilemma, UX focuses on all that concerns the user's path during and after the modeling process. UI, on the other hand, is a method that focuses specifically on how the interface of the product look and work. UX is a whole environment that cannot be confined to the screen. On the contrary, UI is typically visual and screen-related content [18]. A deep learning or ML that has the ability to continuously re-train itself based on user activities can be applied to increasing UX in making decision automatically. Example of such is the fake news/hate posts detection model used by some social media platforms.
