Fiona Carroll Fiona.Carroll@uwe.ac.uk
Occasional Associate Lecturer - FET CSCT
The visual design of network data to enhance cyber security awareness of the everyday internet user
Carroll, Fiona; Legg, Phil; B�nkel, Bastian
Authors
Professor Phil Legg Phil.Legg@uwe.ac.uk
Professor in Cyber Security
Bastian B�nkel
Abstract
Technology and the use of online services are very prevalent across much of our everyday lives. As our digital interactions continue to grow, there is a need to improve public awareness of the risks to our personal online privacy and security. Designing for cyber security awareness has never been so important. In this work, we consider people's current impressions towards their privacy and security online. We also explore how abnormal network activity data can be visually conveyed to afford a heightened cyber security awareness. In detail, the paper documents the different effects of visual variables in an edge and node DoS visualisation to depict abnormally high volumes of traffic. The results from two studies show that people are generally becoming more concerned about their privacy and security online. Moreover, we have found that the more focus based visual techniques (i.e. blur) and geometry-based techniques (i.e. jaggedness and sketchiness) afford stronger impressions of uncertainty from abnormally high volumes of network traffic. In terms of security, these impressions and feelings alert in the end-user that something is not quite as it should be and hence develop a heightened cyber security awareness.
Presentation Conference Type | Conference Paper (unpublished) |
---|---|
Conference Name | IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber Science 2020) |
Start Date | Jun 15, 2020 |
End Date | Jun 19, 2020 |
Deposit Date | May 17, 2020 |
Publicly Available Date | May 18, 2020 |
Public URL | https://uwe-repository.worktribe.com/output/5981548 |
Publisher URL | https://www.c-mric.com/csa2020 |
Files
Carroll2020 Cyberscience
(476 Kb)
PDF
You might also like
Visual analytics of e-mail sociolinguistics for user behavioural analysis
(2014)
Journal Article
Visualizing the insider threat: Challenges and tools for identifying malicious user activity
(2015)
Presentation / Conference Contribution
Quasi-Hamming distances: An overarching concept for measuring glyph similarity
(2015)
Presentation / Conference Contribution
Understanding insider threat: A framework for characterising attacks
(2014)
Presentation / Conference Contribution
Glyph sorting: Interactive visualization for multi-dimensional data
(2013)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search