2016
DOI: 10.22619/ijcsa.2016.100103
|View full text |Cite
|
Sign up to set email alerts
|

Visual Analytics for Non-Expert Users in Cyber Situation Awareness

Abstract: Situation awareness is often described as the perception and comprehension of the current situation, and the projection of future status. Whilst this may be well understood in an organisational cybersecurity context, there is a strong case to be made for effective cybersecurity situation awareness that is tailored to the needs of the Non-Expert User (NEU). Our online usage habits are rapidly evolving with smartphones and tablets being widely used to access resources online. In order for NEUs to remain safe onl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
(13 reference statements)
0
4
0
Order By: Relevance
“…He believes that an artist has at his or her disposal various devices for engaging our attention, drawing us in to the world of the painting and colouring our view of that world [19]. In 2016, Legg proposed a system for capturing and visualising network activity, with a view of this informing non-expert users [13], [14]. Whilst informative and interactive, these 2D plots of a network environment do not fully satisfy the need to be engaging, appealing, and designed such that users will want to continually monitor activity.…”
Section: User Engagement In Cyberspacementioning
confidence: 99%
See 1 more Smart Citation
“…He believes that an artist has at his or her disposal various devices for engaging our attention, drawing us in to the world of the painting and colouring our view of that world [19]. In 2016, Legg proposed a system for capturing and visualising network activity, with a view of this informing non-expert users [13], [14]. Whilst informative and interactive, these 2D plots of a network environment do not fully satisfy the need to be engaging, appealing, and designed such that users will want to continually monitor activity.…”
Section: User Engagement In Cyberspacementioning
confidence: 99%
“…Traditional tools for capturing and analysing network activity, such as Wireshark are clearly not designed for general users. Previously, we have developed tools for exploring and investigating network packet captures using interactive visualisation tools [13] [14]. However, for selfmonitoring tools to be effective, there is a need for an engaging experience that encourages continually revisiting by the user.…”
Section: Introductionmentioning
confidence: 99%
“…The Human factor also plays a decisive role in network security, without appropriate training and awareness [24]. Humans can also be seen as the weak link, hence, when designing intrusion detection systems it is also important to identify attacks against the end-users and expert-users [25]. As shown in Figure 1 (3.5.1) phishing and spear phishing attacks.…”
Section: E Humanmentioning
confidence: 99%
“…They saw it as a space that can be difficult to monitor and navigate; they spent five years exploring rich and varied visual representations of cyberspace's diversity, structure and content to further improve people's understanding of and navigation within it. More recently, Legg [23] discusses the importance of situational awareness in cyberspace (i.e. the perception and comprehension of the current situation, and the projection of future status) stating that the big challenge lies in facilitating the user's understanding through effective visualization.…”
Section: There Are No Signposts In Cyberspacementioning
confidence: 99%