Guidelines for cybersecurity visualization design

Cyber security visualization designers can benefit from human factors engineering concepts and principles to resolve key human factors challenges in visual interface design. We survey human factors concepts and principles that have been applied in the past decade of human factors research. We highlight these concepts and relate them to cybersecurity visualization design. We provide guidelines to help cybersecurity visualization designers address some human factors challenges in the context of interface design. We use ecological interface design approach to present human factors-based principles of interface design for visualization. Cyber security visualization designers will benefit from human factors engineering concepts and principles to resolve key human factors challenges in visual interface design.

[1]  Jing Chen,et al.  The Role of Human Factors/Ergonomics in the Science of Security , 2015, Hum. Factors.

[2]  Daniel R. Tesone,et al.  Achieving Cyber Defense Situational Awareness: A Cognitive Task Analysis of Information Assurance Analysts , 2005 .

[3]  Tim Bass,et al.  Intrusion detection systems and multisensor data fusion , 2000, CACM.

[4]  James T. Enns,et al.  Attention and Visual Memory in Visualization and Computer Graphics , 2012, IEEE Transactions on Visualization and Computer Graphics.

[5]  Catherine M. Burns,et al.  Ecological interface design: a new approach for visualizing network management , 2003, Comput. Networks.

[6]  Céline McKeown,et al.  Designing for Situation Awareness: An Approach to User-Centered Design , 2013 .

[7]  Robert Earl Patterson,et al.  Intuitive Cognition and Models of Human–Automation Interaction , 2017, Hum. Factors.

[8]  Jens Rasmussen,et al.  Skills, rules, and knowledge; signals, signs, and symbols, and other distinctions in human performance models , 1983, IEEE Transactions on Systems, Man, and Cybernetics.

[9]  Georges M. Fadel,et al.  An affordance-based approach to architectural theory, design, and practice , 2009 .

[10]  Ryan K. L. Ko,et al.  UVisP: User-centric Visualization of Data Provenance with Gestalt Principles , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[11]  Carsten Friedrich,et al.  Applying Gestalt principles to animated visualizations of network data , 2002, Proceedings Sixth International Conference on Information Visualisation.

[12]  Christopher D. Wickens,et al.  An introduction to human factors engineering , 1997 .

[13]  Christopher D. Wickens,et al.  Introduction to Engineering Psychology and Human Performance , 2015 .

[14]  Jens Rasmussen,et al.  Cognitive Systems Engineering , 2022 .

[15]  A. Treisman,et al.  A feature-integration theory of attention , 1980, Cognitive Psychology.

[16]  Mica R. Endsley,et al.  Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.

[17]  Kevin B. Bennett Veils: An Ecological Interface for Computer Network Defense , 2014 .

[18]  Cheryl Z. Qian,et al.  Designing a Situational Awareness Information Display: Adopting an Affordance-Based Framework to Amplify User Experience in Environmental Interaction Design , 2016, Informatics.

[19]  R. Shaw,et al.  Perceiving, Acting and Knowing : Toward an Ecological Psychology , 1978 .

[20]  Younho Seong,et al.  Human machine interface in the Internet of Things (IoT) , 2017, 2017 12th System of Systems Engineering Conference (SoSE).

[21]  Kevin B. Bennett,et al.  Visual momentum redux , 2012, Int. J. Hum. Comput. Stud..

[22]  Andreas Buja,et al.  Interactive High-Dimensional Data Visualization , 1996 .

[23]  Alex Baker,et al.  Information visualization metrics and methods for cyber security evaluation , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[24]  J. Wolfe,et al.  Guided Search 2.0 A revised model of visual search , 1994, Psychonomic bulletin & review.

[25]  David D. Woods,et al.  Visual Momentum: A Concept to Improve the Cognitive Coupling of Person and Computer , 1984, Int. J. Man Mach. Stud..

[26]  S. Epstein Intuition from the perspective of cognitive-experiential self-theory. , 2008 .

[27]  Alex Endert,et al.  7 key challenges for visualization in cyber network defense , 2014, VizSEC.

[28]  Steven Pinker,et al.  A theory of graph comprehension. , 1990 .

[29]  Mica R. Endsley,et al.  Designing for Situation Awareness : An Approach to User-Centered Design , 2003 .

[30]  Kevin B. Bennett,et al.  Display and Interface Design: Subtle Science, Exact Art , 2011 .

[31]  Mary Czerwinski,et al.  Selected Human Factors Issues in Information Visualization , 2009 .

[32]  K. J. Vicente,et al.  Cognitive Work Analysis: Toward Safe, Productive, and Healthy Computer-Based Work , 1999 .

[33]  Muhammad Hafiz Wan Rosli,et al.  Gestalt Principles in Multimodal Data Representation , 2015, IEEE Computer Graphics and Applications.

[34]  Ben D. Sawyer,et al.  Addressing Human Factors Gaps in Cyber Defense , 2016 .

[35]  Juliane Junker,et al.  Artificial Intelligence And The Future Of Testing , 2016 .

[36]  H. Rex Hartson,et al.  Cognitive, physical, sensory, and functional affordances in interaction design , 2003, Behav. Inf. Technol..

[37]  Colin Ware,et al.  Information Visualization: Perception for Design , 2000 .

[38]  Brenda K. Wiederhold,et al.  The Role of Psychology in Enhancing Cybersecurity , 2014, Cyberpsychology Behav. Soc. Netw..

[39]  E. Salas,et al.  Human Factors : The Journal of the Human Factors and Ergonomics Society , 2012 .

[40]  R. Hogarth Deciding Analytically or Trusting your Intuition? The Advantages and Disadvantages of Analytic and Intuitive Thought , 2002 .

[41]  Kim J. Vicente,et al.  An Ecological Approach to Interface Design , 1998 .

[42]  David Peebles,et al.  The Effect of Gestalt Laws of Perceptual Organization on the Comprehension of Three-Variable Bar and Line Graphs , 2013, Hum. Factors.

[43]  Gary Klein,et al.  4. Some guidelines for conducting a cognitive task analysis , 2001 .

[44]  Chris North,et al.  Visualizing cyber security: Usable workspaces , 2009, 2009 6th International Workshop on Visualization for Cyber Security.

[45]  Donald A. Norman,et al.  Affordance, conventions, and design , 1999, INTR.

[46]  Emilie M. Roth,et al.  A Cognitive Task Analysis for Cyber Situational Awareness , 2010 .

[47]  Self-Theory Intuition From the Perspective of Cognitive-Experiential , 2011 .

[48]  Jonathan Evans,et al.  Science Perspectives on Psychological , 2022 .

[49]  P. Hancock,et al.  The Human Factors of Cyber Network Defense , 2015 .

[50]  Kevin B. Bennett,et al.  Ecological interface design and system safety: One facet of Rasmussen's legacy. , 2017, Applied ergonomics.

[51]  Diane Staheli,et al.  Unlocking user-centered design methods for building cyber security visualizations , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).