2020
DOI: 10.1007/978-3-030-58465-8_6
|View full text |Cite
|
Sign up to set email alerts
|

Alert Characterization by Non-expert Users in a Cybersecurity Virtual Environment: A Usability Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…As commercially available virtual [1], augmented [2] and mixed reality [3] (VR, AR, MR; collectively "xR") devices have become significantly more performant over the last decade, there has been a commensurate growth in interest in using these tools for three-dimensional data visualizations. Most of this interest has been in (geo)spatial data visualization [4] [5] [6], i.e., the visualization of imaginary, proposed, or real physical environments with overlayed textual information [6] [7]. Researchers and practitioners have focused less on how to represent non-(geo)spatial data using stereoscopically perceivable multidimensional data visualizations (SPMDV).…”
Section: Overviewmentioning
confidence: 99%
“…As commercially available virtual [1], augmented [2] and mixed reality [3] (VR, AR, MR; collectively "xR") devices have become significantly more performant over the last decade, there has been a commensurate growth in interest in using these tools for three-dimensional data visualizations. Most of this interest has been in (geo)spatial data visualization [4] [5] [6], i.e., the visualization of imaginary, proposed, or real physical environments with overlayed textual information [6] [7]. Researchers and practitioners have focused less on how to represent non-(geo)spatial data using stereoscopically perceivable multidimensional data visualizations (SPMDV).…”
Section: Overviewmentioning
confidence: 99%
“…There are attempts to apply UEM on cybernetic security systems rather than on cybersecurity components of larger systems. A study in this sense compares the usability of cybersecurity alerts in three different scenarios created within an augmented reality environment [15]. The authors used a combination of usability testing (i.e., system usability scale) and usability inquiry (i.e., questionnaires) to determine the best simulated environments in which non-experts investigate alerts raised by a cybersecurity defense mechanism.…”
Section: Usability Evaluation In Cybersecuritymentioning
confidence: 99%
“…Asimismo, también existen visualizaciones centradas en geoposicionamiento, ya sea para activos [39,133,157], riesgos [36,170,199] y amenazas [39,157]. Finalmente, destacar el desarrollo de visualizaciones en 3D representadas mediante pantallas que envuelven al usuario o mediante gafas de realidad virtual donde éste puede obtener vistas de 360 grados si se interactúa con las mismas [118,119,138,139,157]. Aparte de estudios realizados por instituciones académicas, también existen estudios y productos de empresas que hacen uso de ML para realizar la caza de amenazas.…”
Section: Soluciones Actualesunclassified