skip to main content
10.1145/3046055.3046064acmotherconferencesArticle/Chapter ViewAbstractPublication PagesstastConference Proceedingsconference-collections
research-article
Public Access

Proposing ambient visualization and pre-attentive processing for threat detection

Published: 05 December 2016 Publication History

Abstract

Computer threats have gradually become the Achilles heel of the modern world, tearing tendon from bone in high security enterprise information systems and desktop computers alike. Even the most ardent advocates of computer security acknowledge the failure of our best practices to save us from grave injury.

References

[1]
Bonnie Brinton Anderson, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle, Seth Howard, and Anthony Vance. 2015. How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 2883--2892.
[2]
T J Ayres and R Kelkar. 2006. Sidewalk potential trip points: A method for characterizing walkways. International Journal of Industrial Ergonomics 36, 12 (Dec. 2006), 1031--1035.
[3]
Meera M. Blattner, Denise A. Sumikawa, and Robert M. Greenberg. 1989. Earcons and Icons: Their Structure and Common Design Principles. Human-Computer Interaction 4, 1 (March 1989), 11--44.
[4]
Jim Blythe, Jean Camp, and Vaibhav Garg. 2011. Targeted risk communication for computer security. In Proceedings of the 16th international conference on Intelligent user interfaces. ACM, 295--298.
[5]
A Lee Dellon, Susan E Mackinnon, and Page McDonald Crosby. 1987. Reliability of two-point discrimination measurements. The Journal of hand surgery 12, 5 (1987), 693--696.
[6]
Rachna Dhamija and J. D. Tygar. 2005. The Battle Against Phishing: Dynamic Security Skins. In Proceedings of the 2005 Symposium on Usable Privacy and Security (SOUPS '05). ACM, New York, NY, USA, 77--88.
[7]
Mica R Endsley. 2015. Situation awareness misconceptions and misunderstandings. Journal of Cognitive Engineering and Decision Making 9, 1 (2015), 4--32.
[8]
Adrienne Porter Felt, Alex Ainslie, Robert W. Reeder, Sunny Consolvo, Somas Thyagaraja, Alan Bettes, Helen Harris, and Jeff Grimes. 2015. Improving SSL Warnings: Comprehension and Adherence. In Proceedings of the Conference on Human Factors and Computing Systems.
[9]
Robert S Gutzwiller, Sunny Fugate, Benjamin D Sawyer, and PA Hancock. 2015. The human factors of cyber network defense. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 59. SAGE Publications, 322--326.
[10]
Cristy Ho and Charles Spence. 2012. The multisensory driver: Implications for ergonomic car interface design. Ashgate Publishing, Ltd.
[11]
Ronald Kainda, Ivan Fléchais, and A W Roscoe. 2010. Security and Usability: Analysis and Evaluation. In 2010 International Conference on Availability, Reliability, and Security (ARES). IEEE, 275--282.
[12]
Paul P Maglio and Christopher S Campbell. 2000. Tradeoffs in displaying peripheral information. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems. ACM, 241--248.
[13]
Tim Maly. 2013. How GM makes a car sound like what a car is supposed to sound like. Medium.com (July 2013), 1--4.
[14]
J Ox. 2014. Analogy and conceptual blending are part of a visualization toolkit for artists and scientists: Introducing the cognitive space transfer. Methods (2014).
[15]
Christopher Plaue and John Stasko. 2007. Animation in a Peripheral Display: Distraction, Appeal, and Information Conveyance in Varying Display Configurations. In GI '07: Proceedings of Graphics Interface 2007. ACM.
[16]
N Sadat Shami, Gilly Leshed, and David Klein. 2005. Context of use evaluation of peripheral displays (CUEPD). In IFIP Conference on Human-Computer Interaction. Springer, 579--587.
[17]
Olaf Sporns, Giulio Tononi, and Rolf Kötter. 2005. The Human Connectome: A Structural Description of the Human Brain. PLoS Comput Biol 1, 4 (09 2005).
[18]
Melissa K Stern and James H Johnson. 2010. Just noticeable difference. Corsini Encyclopedia of Psychology (2010).
[19]
Alex Vieane, Gregory Funke, Robert Gutzwiller, Vincent Mancuso, Ben Sawyer, and Christopher Wickens. 2016. Addressing Human Factors Gaps in Cyber Defense. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 60. SAGE Publications, 770--773.
[20]
Ryan West, Christopher Mayhorn, Jefferson Hardee, and Jeremy Mendel. 2016. The Weakest Link. In Strategies for Knowledge Management Success.
[21]
Christopher D Wickens. 2010. Multiple resources and performance prediction. Theoretical Issues in Ergonomics Science 3, 2 (Nov. 2010), 159--177.
[22]
Christopher D Wickens and Amy L Alexander. 2009. Attentional Tunneling and Task Management in Synthetic Vision Displays. The International Journal of Aviation Psychology (2009).
[23]
C D Wickens, J G Hollands, S Banbury, and R Parasuraman. 2013. Engineering psychology and human performance. Psychology Press.
[24]
C Wisneski, H Ishii, A Dahley, M Gorbet, S. Brave, B. Ullmer, and P. Yarin. 1998. Ambient Displays: Turning Architectural Space into an Interface between People and Digital Information. Cooperative buildings: Integrating information, organization, and architecture (1998), 22--32.
[25]
Min Wu, Robert C Miller, and Simson L Garfinkel. 2006. Do security toolbars actually prevent phishing attacks?. In Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM, 601--610.
[26]
William A Yost and Robert S Schlauch. 2001. Fundamentals of Hearing: An Introduction (4th edition). The Journal of the Acoustical Society of America 110, 4 (Oct. 2001), 1713--1714.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
STAST '16: Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust
December 2016
101 pages
ISBN:9781450348263
DOI:10.1145/3046055
This paper is authored by an employee(s) of the United States Government and is in the public domain. Non-exclusive copying or redistribution is allowed, provided that the article citation is given and the authors and agency are clearly identified as its source.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 December 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ambient visualization
  2. perception
  3. system instrumentation
  4. system security

Qualifiers

  • Research-article

Funding Sources

Conference

STAST '16
STAST '16: Socio-Technical Aspects in Security and Trust
December 5, 2016
California, Los Angeles

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 149
    Total Downloads
  • Downloads (Last 12 months)39
  • Downloads (Last 6 weeks)12
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media