• English
    • Welsh
  • English 
    • English
    • Welsh
  • Login
Search DSpace:
  • Home
  • Research at Cardiff Met
  • Library Services
  • Contact Us
View item 
  • DSpace home
  • Cardiff School of Technologies
  • School of Technologies Research
  • View item
  • DSpace home
  • Cardiff School of Technologies
  • School of Technologies Research
  • View item
JavaScript is disabled for your browser. Some features of this site may not work without it.

The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User

Thumbnail
View/open
CopyrightReceipt.pdf (19.02Kb)
Author
Carroll, Fiona
Legg, Phil
Bonkel, Bastian
Date
2020-06-17
Acceptance date
2020-04-15
Type
Conference paper
Publisher
IEEE
Embargoed until
2100-01-01
Metadata
Show full item record
Abstract
Technology and the use of online services are very prevalent across much of our everyday lives. As our digital interactions continue to grow, there is a need to improve public awareness of the risks to our personal online privacy and security. Designing for cyber security awareness has never been so important. In this work, we consider people’s current impressions towards their privacy and security online. We also explore how abnormal network activity data can be visually conveyed to afford a heightened cyber security awareness. In detail, the paper documents the different effects of visual variables in an edge and node DoS visualisation to depict abnormally high volumes of traffic. The results from two studies show that people are generally becoming more concerned about their privacy and security online. Moreover, we have found that the more focus based visual techniques (i.e. blur) and geometry-based techniques (i.e. jaggedness and sketchiness) afford stronger impressions of uncertainty from abnormally high volumes of network traffic. In terms of security, these impressions and feelings alert in the end-user that something is not quite as it should be and hence develop a heightened cyber security awareness.
Journal/conference proceeding
International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA);
Citation
Carroll, F., Legg, P., Bonkel, B. (2020) ‘The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User. 15-17 June. International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA).
URI
https://www.c-mric.com/csa2020
http://hdl.handle.net/10369/11030
Description
Conference paper presented virtually at International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 15-17 June 2020.
Rights
http://www.rioxx.net/licenses/all-rights-reserved
Sponsorship
Cardiff Metropolitan University (Grant ID: Cardiff Metropolian (Internal))
Collections
  • School of Technologies Research [147]

Related items

Showing items related by title, author, subject and abstract.

  • Thumbnail

    AN INVESTIGATION INTO THE AWARENESS OF CYBER SECURITY AND PRIVACY POLICIES AMONGST THE UK POPULATION 

    Darlington, Scott (Cardiff Metropolitan University, 2018-07)
    Cybercrime is continually growing in today’s technological world. It is vital for individuals in the UK to be more aware of cyber security and privacy policies. Research into the UK population’s understanding on cyber ...
  • Thumbnail

    An Examination of Penetration Testing (Ethical Hacking) and Delivering 

    Jones, David Andrew (Cardiff Metropolitan University, 2015-05)
    The overall aim of this research is to examine penetration testing and deliver the proposed tests to Clee Tompkinson Francis, to investigate the impact on a small business network’. The continual advancement in technology ...
  • Thumbnail

    Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence 

    Montasari, R.; Carroll, Fiona; Jahankhani, H.; Hosseinian-Far, A.; Daneshkhah, A. (Springer, 2021-01-07)
    Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks ...

Browse

DSpace at Cardiff MetCommunities & CollectionsBy issue dateAuthorsTitlesSubjectsThis collectionBy issue dateAuthorsTitlesSubjects

My Account

Login

Statistics

Most Popular ItemsStatistics by CountryMost Popular Authors

DSpace software copyright © 2002-2015  DuraSpace
Contact us | Send feedback | Administrator