skip to main content
10.1145/2841113.2841118acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article

Examining the Contribution of Critical Visualisation to Information Security

Authors Info & Claims
Published:08 September 2015Publication History

ABSTRACT

This paper examines the use of visualisations in the field of information security and in particular focuses on the practice of information security risk assessment. We examine the current roles of information security visualisations and place these roles in the wider information visualisation discourse. We present an analytic lens which divides visualisations into three categories: journalistic, scientific and critical visualisations. We then present a case study that uses these three categories of visualisations to further support information security practice.

Two significant results emerge from this case study: (1) visualisations that promote critical thinking and reflection (a form of critical visualisation) support the multi-stakeholder nature of risk assessment and (2) a preparatory stage in risk assessment is sometimes needed by service designers in order to establish the service design before conducting a formal risk assessment.

The reader is invited to explore the images in the digital version of this paper where they can zoom in to particular aspects of the images and view the images in colour.

References

  1. U. Beck. Risk society: Towards a new modernity, volume 17. Sage Publications, 1992.Google ScholarGoogle Scholar
  2. R. Bernstein. Beyond Objectivism and Relativism: Science, Hermeneutics, and Praxis. University of Pennsylvania Press, 1983.Google ScholarGoogle Scholar
  3. J. Bertin. Semiology of graphics: diagrams, networks, maps. 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Bleikertz, T. Gross, and S. Moedersheim. Modeling and analysis of dynamic infrastructure clouds. 2013. Online; accessed 2015-04-02.Google ScholarGoogle Scholar
  5. A. Cameron. Ground zero--the semiotics of the boundary line. Social Semiotics, 21(3):417--434, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  6. R. Chambers et al. Whose reality counts?: putting the first last. Intermediate Technology Publications Ltd (ITP), 1997.Google ScholarGoogle ScholarCross RefCross Ref
  7. C. Cipolla and E. Manzini. Relational services. Knowledge, Technology & Policy, 22(1):45--50, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  8. J. Crampton, G. Gutin, and A. Yeo. On the parameterized complexity and kernelization of the workflow satisfiability problem. ACM Transactions on Information and System Security (TISSEC), 16(1):4, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. W. Crampton. Mapping: A critical introduction to cartography and GIS, volume 11. John Wiley & Sons, 2011.Google ScholarGoogle Scholar
  10. M. Douglas and A. Wildavsky. Risk and culture: An essay on the selection of technological and environmental dangers. Univ of California Press, 1983.Google ScholarGoogle ScholarCross RefCross Ref
  11. P. Dourish. What we talk about when we talk about context. Personal and ubiquitous computing, 8(1):19--30, 2004.Google ScholarGoogle Scholar
  12. P. Dourish, R. E. Grinter, J. D. De La Flor, and M. Joseph. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6):391--401, 2004. Google ScholarGoogle ScholarCross RefCross Ref
  13. J. Drucker. SpecLab: Digital aesthetics and projects in speculative computing. University of Chicago Press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Ehn. Participation in design things. In Proceedings of the Tenth Anniversary Conference on Participatory Design 2008, pages 92--101. Indiana University, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. U. Eisenreich. Teamwork sociogram. http://http://www.hier-eisenreich.org, 2002. Online; accessed 2015-04-05.Google ScholarGoogle Scholar
  16. L. C. Freeman. Visualizing social networks. Journal of social structure, 1(1):4, 2000.Google ScholarGoogle Scholar
  17. P. Galison. Images scatter into data, data gather into images. Images: A Reader, page 236, 2006.Google ScholarGoogle Scholar
  18. P. Hall, A. Blauvelt, E. Lupton, R. Giampietro, and W. A. Center. Graphic design: now in production : Chapter: Bubbles, lines and string: how information shapes society. Walker Art Center, Minneapolis, MN, c2011.Google ScholarGoogle Scholar
  19. J. B. Harley. Maps, knowledge, and power. Geographic Thought-A praxis perspective, 2009.Google ScholarGoogle Scholar
  20. C. P. Heath, L. Coles-Kemp, and P. A. Hall. Logical lego?: Co-constructed perspectives on service design. NordDesign 2014, Proceedings, 2014.Google ScholarGoogle Scholar
  21. R. I. V. Hodge. Social semiotics. Cornell University Press, 1988.Google ScholarGoogle Scholar
  22. M. James, A. McFarland Daniel, and B.-D. Skye. Dynamic network visualization: Methods for meaning with longitudinal network movies. American Journal of Sociology, 110(4):1206--1241, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  23. V. Krebs. Finding go-to people and subject matter experts {sme}. http://www.orgnet.com/experts.html, 2008. Online; accessed 2015-04-05.Google ScholarGoogle Scholar
  24. T. S. Kuhn. The structure of scientific revolutions. University of Chicago press, 1962.Google ScholarGoogle Scholar
  25. M. M. Lankhorst, H. A. Proper, and H. Jonkers. The architecture of the archimate language. In Enterprise, Business-Process and Information Systems Modeling, pages 367--380. Springer, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  26. B. Latour. A cautious prometheus? a few steps toward a philosophy of design (with special attention to peter sloterdijk. In Proceedings of the 2008 Annual International Conference of the Design History Society, Universal Publishers, pages 2--10, 2008.Google ScholarGoogle Scholar
  27. Mandiant. Mandiant intelligence center report, 2013: Apt1 exposing one of china's cyber espionage units. http://intelreport.mandiant.com/, 2013. Online; accessed 2015-04-05.Google ScholarGoogle Scholar
  28. Mandiant. Mandiant threat report: M-trends 2015: A view from the front lines. https://www.mandiant.com/resources/mandiant-reports, 2015. Online; accessed 2015-04-05.Google ScholarGoogle Scholar
  29. R. Marty. Applied security visualization. Addison-Wesley Upper Saddle River, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. S. Nikolow. "Words divide, pictures unite". Otto Neurath's pictorial statistics in historical context, volume 2 of Image and imaging in philosophy, science and the arts, pages 85--98. ontos Verlag, 2011.Google ScholarGoogle Scholar
  31. A. H. Robinson. Early thematic mapping in the history of cartography. 1982.Google ScholarGoogle Scholar
  32. D. Rosenberg and A. Grafton. Cartographies of Time: a History of the Timeline. Princeton Architectural Press, 2013.Google ScholarGoogle Scholar
  33. H. Rosling. Gapminder - a fact-based worldview. http://www.gapminder.org, 2005. Online; accessed 2015-04-02.Google ScholarGoogle Scholar
  34. T. Segaran and J. Hammerbacher. Beautiful data: the stories behind elegant data solutions. "O'Reilly Media, Inc.", 2009.Google ScholarGoogle Scholar
  35. E. Segel and J. Heer. Narrative visualization: Telling stories with data. Visualization and Computer Graphics, IEEE Transactions on, 16(6):1139--1148, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. B. Sherrill, C. Poulin, D. Kaplan, D. Franklin, E. Maor, J. Kravitz, L. Horacek, P. Cobb, R. Hay, and S. Moore. Ibm x-force threat intelligence quarterly, 1q 2015. http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=WGL03073USEN, 2015. Online; accessed 2015-04-02.Google ScholarGoogle Scholar
  37. B. Shneiderman. Designing the user interface-strategies for effective human-computer interaction. Pearson Education India, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. The Open Group. Risk taxonomy technical standard. www.opengroup.org/onlinepubs/9699919899/toc.pdf, 2009. Online; accessed 2015-04-05.Google ScholarGoogle Scholar
  39. Trustwave. 2014 trustwave global security report. https://www.trustwave.com/gsr, 2014. Online; accessed 2015-04-05.Google ScholarGoogle Scholar
  40. E. R. Tufte. The visual display of quantitative information, 2nd edition. Graphics Press, 2001.Google ScholarGoogle Scholar
  41. Verizon. Verizon 2015 data breach investigations report. http://www.verizonenterprise.com/DBIR/2015, 2014. Online; accessed 2015-04-05.Google ScholarGoogle Scholar
  42. M. Wattenberg. Numbers, words and colors; presentation at the mit hyperstudio humanities + digital conference on visual interpretation, cambridge mass.web. http://video.mit.edu/watch/numbers-words-and-colors-9598, 2010. Online; accessed 2015-04-07.Google ScholarGoogle Scholar
  43. D. Wood. Rethinking the power of maps. Guilford Press, 2010.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    NSPW '15: Proceedings of the 2015 New Security Paradigms Workshop
    September 2015
    163 pages
    ISBN:9781450337540
    DOI:10.1145/2841113

    Copyright © 2015 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 8 September 2015

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate62of170submissions,36%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader