Professor Phil Legg Phil.Legg@uwe.ac.uk
Professor in Cyber Security
Enhancing cyber situation awareness for non-expert users using visual analytics
Legg, Philip
Authors
Abstract
Situation awareness is often described as the perception and comprehension of the current situation, and the projection of future status. Whilst this may be understood in an organisational cybersecurity context, there is a strong case to be made for effective cybersecurity situation awareness that is tailored to the needs of the Non-Expert User (NEU). Our online usage habits are rapidly evolving with smartphones and tablets being widely used to access resources online. In order for NEUs to remain safe online, there is a need to enhance awareness and understanding of cybersecurity concerns, such as how devices may be acting online, and what data is being shared between devices. In this paper, we explore the notion of personal situation awareness for NEUs. We conduct a small-scale study to understand how NEUs perceive cybersecurity. We also propose how visual analytics could be used to help encourage NEUs to actively monitor and observe their activity for greater online awareness. The guidance developed through the course of this work can help practitioners develop tools that could help NEUs better understand their online actions, with the aim to result in safer experiences when acting online.
Presentation Conference Type | Conference Paper (unpublished) |
---|---|
Conference Name | International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA 2016) |
Start Date | Jun 13, 2016 |
End Date | Jun 14, 2016 |
Acceptance Date | Mar 28, 2016 |
Publication Date | Jan 1, 2016 |
Deposit Date | Apr 8, 2016 |
Publicly Available Date | Jul 13, 2016 |
Peer Reviewed | Peer Reviewed |
Keywords | cyber situation awareness, non-expert, visual analytics |
Public URL | https://uwe-repository.worktribe.com/output/920724 |
Publisher URL | http://dx.doi.org/10.1109/CyberSA.2016.7503278 |
Related Public URLs | http://www.c-mric.org/index.php/csa2016 |
Additional Information | Additional Information : (c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works Title of Conference or Conference Proceedings : International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA 2016), |
Contract Date | Apr 8, 2016 |
Files
CyberSA-Legg-CMRIC.docx
(1.5 Mb)
Document
cybersa_final.pdf
(957 Kb)
PDF
You might also like
Visual analytics of e-mail sociolinguistics for user behavioural analysis
(2014)
Journal Article
Visualizing the insider threat: Challenges and tools for identifying malicious user activity
(2015)
Presentation / Conference Contribution
Quasi-Hamming distances: An overarching concept for measuring glyph similarity
(2015)
Presentation / Conference Contribution
Understanding insider threat: A framework for characterising attacks
(2014)
Presentation / Conference Contribution
Glyph sorting: Interactive visualization for multi-dimensional data
(2013)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search