2015
DOI: 10.1093/cybsec/tyv004
|View full text |Cite
|
Sign up to set email alerts
|

Critical visualization: a case for rethinking how we visualize risk and security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 17 publications
0
12
0
1
Order By: Relevance
“…Progressive classification has also been invoked in the context of data visualization, which is regarded as an important tool when dealing with complex data, as in the area of cybersecurity. In an article on rethinking how risk and security are visualized, Hall, Heath, and Coles-Kemp (2015) wrote,…”
Section: Hci and Interface Designmentioning
confidence: 99%
“…Progressive classification has also been invoked in the context of data visualization, which is regarded as an important tool when dealing with complex data, as in the area of cybersecurity. In an article on rethinking how risk and security are visualized, Hall, Heath, and Coles-Kemp (2015) wrote,…”
Section: Hci and Interface Designmentioning
confidence: 99%
“…the perception and comprehension of the current situation, and the projection of future status) stating that the big challenge lies in facilitating the user's understanding through effective visualization. Moreover, some feel that producers of these current 'cyberspace' visualizations focus too narrowly on adversarial security issues, ignoring important perceptions and narratives of individual and community security [18]. Others argue that many of the ways in which we discuss, imagine and envision the internet rely on inaccurate and unhelpful spatial metaphors [16].…”
Section: There Are No Signposts In Cyberspacementioning
confidence: 99%
“…For these visualizations to adequately represent the relationships between nodes, there needs to be a clear identity distinction between the insiders and outsiders of a network. Commenting on node and link visualizations, Hall et al (2015) note that ''visualization presupposes fixed behaviour types: insiders are either loyal or malicious. Such a distinction complies with militaristic approaches of the past, but in cloud computing the distinction between insiders and outsiders is not easy to make'' (p. 95).…”
Section: Protocolmentioning
confidence: 99%