Professor Phil Legg Phil.Legg@uwe.ac.uk
Professor in Cyber Security
Visual analytics for non-expert users in cyber situation awareness
Legg, Philip
Authors
Abstract
Situation awareness is often described as the perception and comprehension of the current situation, and the projection of future status. Whilst this may be well understood in an organisational cybersecurity context, there is a strong case to be made for effective cybersecurity situation awareness that is tailored to the needs of the Non-Expert User (NEU). Our online usage habits are rapidly evolving with smartphones and tablets being widely used to access resources online. In order for NEUs to remain safe online, there is a need to enhance awareness and understanding of cybersecurity concerns, such as how devices may be acting online, and what data is being shared between devices. In this paper, we extend our proposal of the Enhanced Personal Situation Awareness (ePSA) framework to consider the key details of cyber situation awareness that would be of concern to NEUs, and we consider how such information can be effectively conveyed using a visual analytic approach. We present the design of our visual analytics approach to show how this can represent the key details of cyber situation awareness whilst maintaining a simple and clean design scheme so as to not result in information-overload for the user. The guidance developed through the course of this work can help practitioners develop tools that could help NEUs better understand their online actions, with the aim of giving users greater control and safer experiences when their personal devices are acting online.
Journal Article Type | Article |
---|---|
Acceptance Date | Sep 7, 2016 |
Publication Date | Nov 1, 2016 |
Deposit Date | Mar 23, 2017 |
Publicly Available Date | Mar 23, 2017 |
Journal | International Journal on Cyber Situational Awareness |
Print ISSN | 2057-2182 |
Peer Reviewed | Peer Reviewed |
Volume | 1 |
Issue | 1 |
DOI | https://doi.org/10.22619/IJCSA |
Keywords | situation awareness, visual analytics, cyber security |
Public URL | https://uwe-repository.worktribe.com/output/906559 |
Publisher URL | http://www.c-mric.org/100103 |
Additional Information | Additional Information : This article is open access. The journal's open access and license policy can be found here: http://www.c-mric.org/policy/C-MRIC.ORG%20Journal%20Open%20Access%20Policy.pdf |
Contract Date | Mar 23, 2017 |
Files
2016-ijcsa.pdf
(3.8 Mb)
PDF
You might also like
Visual analytics of e-mail sociolinguistics for user behavioural analysis
(2014)
Journal Article
Visualizing the insider threat: Challenges and tools for identifying malicious user activity
(2015)
Presentation / Conference Contribution
Quasi-Hamming distances: An overarching concept for measuring glyph similarity
(2015)
Presentation / Conference Contribution
Understanding insider threat: A framework for characterising attacks
(2014)
Presentation / Conference Contribution
Glyph sorting: Interactive visualization for multi-dimensional data
(2013)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search