{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T22:36:04Z","timestamp":1777415764680,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2841113.2841118","type":"proceedings-article","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T19:49:49Z","timestamp":1449776989000},"page":"59-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Examining the Contribution of Critical Visualisation to Information Security"],"prefix":"10.1145","author":[{"given":"Peter","family":"Hall","sequence":"first","affiliation":[{"name":"Griffith University, Queensland College of Art, QLD4101, Australia, +61737353158"}]},{"given":"Claude","family":"Heath","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, TW200EX, UK, +441783443084"}]},{"given":"Lizzie","family":"Coles-Kemp","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, TW200EX, UK, +441783443084"}]},{"given":"Axel","family":"Tanner","sequence":"additional","affiliation":[{"name":"IBM Research Division, CH 8803, Rueschlikon, Switzerland, +41447248249"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Risk society: Towards a new modernity","author":"Beck U.","year":"1992","unstructured":"U. Beck . Risk society: Towards a new modernity , volume 17 . Sage Publications , 1992 . U. Beck. Risk society: Towards a new modernity, volume 17. Sage Publications, 1992."},{"key":"e_1_3_2_1_2_1","volume-title":"Beyond Objectivism and Relativism: Science, Hermeneutics, and Praxis","author":"Bernstein R.","year":"1983","unstructured":"R. Bernstein . Beyond Objectivism and Relativism: Science, Hermeneutics, and Praxis . University of Pennsylvania Press , 1983 . R. Bernstein. Beyond Objectivism and Relativism: Science, Hermeneutics, and Praxis. University of Pennsylvania Press, 1983."},{"key":"e_1_3_2_1_3_1","volume-title":"Semiology of graphics: diagrams, networks, maps","author":"Bertin J.","year":"1983","unstructured":"J. Bertin . Semiology of graphics: diagrams, networks, maps . 1983 . J. Bertin. Semiology of graphics: diagrams, networks, maps. 1983."},{"key":"e_1_3_2_1_4_1","volume-title":"Modeling and analysis of dynamic infrastructure clouds","author":"Bleikertz S.","year":"2013","unstructured":"S. Bleikertz , T. Gross , and S. Moedersheim . Modeling and analysis of dynamic infrastructure clouds . 2013 . Online ; accessed 2015-04-02. S. Bleikertz, T. Gross, and S. Moedersheim. Modeling and analysis of dynamic infrastructure clouds. 2013. Online; accessed 2015-04-02."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/10350330.2011.564391"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3362\/9781780440453"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12130-009-9066-z"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487222.2487226"},{"key":"e_1_3_2_1_9_1","volume-title":"Mapping: A critical introduction to cartography and GIS","author":"Crampton J. W.","year":"2011","unstructured":"J. W. Crampton . Mapping: A critical introduction to cartography and GIS , volume 11 . John Wiley & Sons , 2011 . J. W. Crampton. Mapping: A critical introduction to cartography and GIS, volume 11. John Wiley & Sons, 2011."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1525\/9780520907393"},{"key":"e_1_3_2_1_11_1","volume-title":"What we talk about when we talk about context. Personal and ubiquitous computing, 8(1):19--30","author":"Dourish P.","year":"2004","unstructured":"P. Dourish . What we talk about when we talk about context. Personal and ubiquitous computing, 8(1):19--30 , 2004 . P. Dourish. What we talk about when we talk about context. Personal and ubiquitous computing, 8(1):19--30, 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1717842"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1795234.1795248"},{"key":"e_1_3_2_1_15_1","volume-title":"Teamwork sociogram","author":"Eisenreich U.","unstructured":"U. Eisenreich . Teamwork sociogram . http:\/\/http:\/\/www.hier-eisenreich.org, 2002. Online; accessed 2015-04-05. U. Eisenreich. Teamwork sociogram. http:\/\/http:\/\/www.hier-eisenreich.org, 2002. Online; accessed 2015-04-05."},{"key":"e_1_3_2_1_16_1","volume-title":"Visualizing social networks. Journal of social structure, 1(1):4","author":"Freeman L. C.","year":"2000","unstructured":"L. C. Freeman . Visualizing social networks. Journal of social structure, 1(1):4 , 2000 . L. C. Freeman. Visualizing social networks. Journal of social structure, 1(1):4, 2000."},{"key":"e_1_3_2_1_17_1","volume-title":"Images scatter into data, data gather into images. Images: A Reader, page 236","author":"Galison P.","year":"2006","unstructured":"P. Galison . Images scatter into data, data gather into images. Images: A Reader, page 236 , 2006 . P. Galison. Images scatter into data, data gather into images. Images: A Reader, page 236, 2006."},{"key":"e_1_3_2_1_18_1","volume-title":"Graphic design: now in production : Chapter: Bubbles, lines and string: how information shapes society","author":"Hall P.","year":"2011","unstructured":"P. Hall , A. Blauvelt , E. Lupton , R. Giampietro , and W. A. Center . Graphic design: now in production : Chapter: Bubbles, lines and string: how information shapes society . Walker Art Center , Minneapolis, MN , c 2011 . P. Hall, A. Blauvelt, E. Lupton, R. Giampietro, and W. A. Center. Graphic design: now in production : Chapter: Bubbles, lines and string: how information shapes society. Walker Art Center, Minneapolis, MN, c2011."},{"key":"e_1_3_2_1_19_1","volume-title":"knowledge, and power. Geographic Thought-A praxis perspective","author":"Harley J. B.","year":"2009","unstructured":"J. B. Harley . Maps , knowledge, and power. Geographic Thought-A praxis perspective , 2009 . J. B. Harley. Maps, knowledge, and power. Geographic Thought-A praxis perspective, 2009."},{"key":"e_1_3_2_1_20_1","volume-title":"NordDesign 2014","author":"Heath C. P.","year":"2014","unstructured":"C. P. Heath , L. Coles-Kemp , and P. A. Hall . Logical lego?: Co-constructed perspectives on service design . NordDesign 2014 , Proceedings , 2014 . C. P. Heath, L. Coles-Kemp, and P. A. Hall. Logical lego?: Co-constructed perspectives on service design. NordDesign 2014, Proceedings, 2014."},{"key":"e_1_3_2_1_21_1","volume-title":"Social semiotics","author":"Hodge R. I. V.","year":"1988","unstructured":"R. I. V. Hodge . Social semiotics . Cornell University Press , 1988 . R. I. V. Hodge. Social semiotics. Cornell University Press, 1988."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1086\/421509"},{"key":"e_1_3_2_1_23_1","volume-title":"Finding go-to people and subject matter experts {sme}","author":"Krebs V.","unstructured":"V. Krebs . Finding go-to people and subject matter experts {sme} . http:\/\/www.orgnet.com\/experts.html, 2008. Online; accessed 2015-04-05. V. Krebs. Finding go-to people and subject matter experts {sme}. http:\/\/www.orgnet.com\/experts.html, 2008. Online; accessed 2015-04-05."},{"key":"e_1_3_2_1_24_1","volume-title":"University of Chicago press","author":"Kuhn T. S.","year":"1962","unstructured":"T. S. Kuhn . The structure of scientific revolutions. University of Chicago press , 1962 . T. S. Kuhn. The structure of scientific revolutions. University of Chicago press, 1962."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01862-6_30"},{"key":"e_1_3_2_1_26_1","first-page":"2","volume-title":"Proceedings of the 2008 Annual International Conference of the Design History Society, Universal Publishers","author":"Latour B.","year":"2008","unstructured":"B. Latour . A cautious prometheus? a few steps toward a philosophy of design (with special attention to peter sloterdijk . In Proceedings of the 2008 Annual International Conference of the Design History Society, Universal Publishers , pages 2 -- 10 , 2008 . B. Latour. A cautious prometheus? a few steps toward a philosophy of design (with special attention to peter sloterdijk. In Proceedings of the 2008 Annual International Conference of the Design History Society, Universal Publishers, pages 2--10, 2008."},{"key":"e_1_3_2_1_27_1","volume-title":"Mandiant intelligence center report","year":"2013","unstructured":"Mandiant. Mandiant intelligence center report , 2013 : Apt 1 exposing one of china's cyber espionage units. http:\/\/intelreport.mandiant.com\/, 2013. Online; accessed 2015-04-05. Mandiant. Mandiant intelligence center report, 2013: Apt1 exposing one of china's cyber espionage units. http:\/\/intelreport.mandiant.com\/, 2013. Online; accessed 2015-04-05."},{"key":"e_1_3_2_1_28_1","volume-title":"Mandiant threat report: M-trends 2015: A view from the front lines. https:\/\/www.mandiant.com\/resources\/mandiant-reports","year":"2015","unstructured":"Mandiant. Mandiant threat report: M-trends 2015: A view from the front lines. https:\/\/www.mandiant.com\/resources\/mandiant-reports , 2015 . Online ; accessed 2015-04-05. Mandiant. Mandiant threat report: M-trends 2015: A view from the front lines. https:\/\/www.mandiant.com\/resources\/mandiant-reports, 2015. Online; accessed 2015-04-05."},{"key":"e_1_3_2_1_29_1","volume-title":"Applied security visualization","author":"Marty R.","year":"2009","unstructured":"R. Marty . Applied security visualization . Addison-Wesley Upper Saddle River , 2009 . R. Marty. Applied security visualization. Addison-Wesley Upper Saddle River, 2009."},{"key":"e_1_3_2_1_30_1","unstructured":"S.\n      Nikolow\n    . \"Words divide pictures unite\". Otto Neurath's pictorial statistics in historical context volume \n  2\n   of \n  Image and imaging in philosophy science and the arts pages \n  85\n  --\n  98\n  . ontos \n  Verlag 2011\n  .  S. Nikolow. \"Words divide pictures unite\". Otto Neurath's pictorial statistics in historical context volume 2 of Image and imaging in philosophy science and the arts pages 85--98. ontos Verlag 2011."},{"key":"e_1_3_2_1_31_1","volume-title":"Early thematic mapping in the history of cartography","author":"Robinson A. H.","year":"1982","unstructured":"A. H. Robinson . Early thematic mapping in the history of cartography . 1982 . A. H. Robinson. Early thematic mapping in the history of cartography. 1982."},{"key":"e_1_3_2_1_32_1","volume-title":"Cartographies of Time: a History of the Timeline","author":"Rosenberg D.","year":"2013","unstructured":"D. Rosenberg and A. Grafton . Cartographies of Time: a History of the Timeline . Princeton Architectural Press , 2013 . D. Rosenberg and A. Grafton. Cartographies of Time: a History of the Timeline. Princeton Architectural Press, 2013."},{"key":"e_1_3_2_1_33_1","volume-title":"Gapminder - a fact-based worldview","author":"Rosling H.","unstructured":"H. Rosling . Gapminder - a fact-based worldview . http:\/\/www.gapminder.org, 2005. Online; accessed 2015-04-02. H. Rosling. Gapminder - a fact-based worldview. http:\/\/www.gapminder.org, 2005. Online; accessed 2015-04-02."},{"key":"e_1_3_2_1_34_1","volume-title":"Beautiful data: the stories behind elegant data solutions. \"O'Reilly Media","author":"Segaran T.","year":"2009","unstructured":"T. Segaran and J. Hammerbacher . Beautiful data: the stories behind elegant data solutions. \"O'Reilly Media , Inc .\", 2009 . T. Segaran and J. Hammerbacher. Beautiful data: the stories behind elegant data solutions. \"O'Reilly Media, Inc.\", 2009."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2010.179"},{"key":"e_1_3_2_1_36_1","volume-title":"Ibm x-force threat intelligence quarterly, 1q","author":"Sherrill B.","year":"2015","unstructured":"B. Sherrill , C. Poulin , D. Kaplan , D. Franklin , E. Maor , J. Kravitz , L. Horacek , P. Cobb , R. Hay , and S. Moore . Ibm x-force threat intelligence quarterly, 1q 2015 . http:\/\/www-01.ibm.com\/common\/ssi\/cgi-bin\/ssialias?htmlfid=WGL03073USEN, 2015. Online; accessed 2015-04-02. B. Sherrill, C. Poulin, D. Kaplan, D. Franklin, E. Maor, J. Kravitz, L. Horacek, P. Cobb, R. Hay, and S. Moore. Ibm x-force threat intelligence quarterly, 1q 2015. http:\/\/www-01.ibm.com\/common\/ssi\/cgi-bin\/ssialias?htmlfid=WGL03073USEN, 2015. Online; accessed 2015-04-02."},{"key":"e_1_3_2_1_37_1","volume-title":"Pearson Education India","author":"Shneiderman B.","year":"1986","unstructured":"B. Shneiderman . Designing the user interface-strategies for effective human-computer interaction . Pearson Education India , 1986 . B. Shneiderman. Designing the user interface-strategies for effective human-computer interaction. Pearson Education India, 1986."},{"key":"e_1_3_2_1_38_1","volume-title":"Risk taxonomy technical standard. www.opengroup.org\/onlinepubs\/9699919899\/toc.pdf","author":"The Open Group","year":"2009","unstructured":"The Open Group . Risk taxonomy technical standard. www.opengroup.org\/onlinepubs\/9699919899\/toc.pdf , 2009 . Online ; accessed 2015-04-05. The Open Group. Risk taxonomy technical standard. www.opengroup.org\/onlinepubs\/9699919899\/toc.pdf, 2009. Online; accessed 2015-04-05."},{"key":"e_1_3_2_1_39_1","volume-title":"2014 trustwave global security report. https:\/\/www.trustwave.com\/gsr","year":"2014","unstructured":"Trustwave. 2014 trustwave global security report. https:\/\/www.trustwave.com\/gsr , 2014 . Online ; accessed 2015-04-05. Trustwave. 2014 trustwave global security report. https:\/\/www.trustwave.com\/gsr, 2014. Online; accessed 2015-04-05."},{"key":"e_1_3_2_1_40_1","volume-title":"The visual display of quantitative information","author":"Tufte E. R.","year":"2001","unstructured":"E. R. Tufte . The visual display of quantitative information , 2 nd edition. Graphics Press , 2001 . E. R. Tufte. The visual display of quantitative information, 2nd edition. Graphics Press, 2001.","edition":"2"},{"key":"e_1_3_2_1_41_1","volume-title":"Verizon 2015 data breach investigations report","unstructured":"Verizon. Verizon 2015 data breach investigations report . http:\/\/www.verizonenterprise.com\/DBIR\/2015, 2014. Online; accessed 2015-04-05. Verizon. Verizon 2015 data breach investigations report. http:\/\/www.verizonenterprise.com\/DBIR\/2015, 2014. Online; accessed 2015-04-05."},{"key":"e_1_3_2_1_42_1","volume-title":"words and colors","author":"Wattenberg M.","year":"2010","unstructured":"M. Wattenberg . Numbers , words and colors ; presentation at the mit hyperstudio humanities + digital conference on visual interpretation, cambridge mass.web. http:\/\/video.mit.edu\/watch\/numbers-words-and-colors-9598, 2010 . Online ; accessed 2015-04-07. M. Wattenberg. Numbers, words and colors; presentation at the mit hyperstudio humanities + digital conference on visual interpretation, cambridge mass.web. http:\/\/video.mit.edu\/watch\/numbers-words-and-colors-9598, 2010. Online; accessed 2015-04-07."},{"key":"e_1_3_2_1_43_1","volume-title":"Guilford Press","author":"Wood D.","year":"2010","unstructured":"D. Wood . Rethinking the power of maps . Guilford Press , 2010 . D. Wood. Rethinking the power of maps. Guilford Press, 2010."}],"event":{"name":"NSPW '15: New Security Paradigms Workshop","location":"Twente Netherlands","acronym":"NSPW '15","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 2015 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841118","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2841113.2841118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:47Z","timestamp":1750222427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":43,"alternative-id":["10.1145\/2841113.2841118","10.1145\/2841113"],"URL":"https:\/\/doi.org\/10.1145\/2841113.2841118","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}