{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T03:32:20Z","timestamp":1772076740765,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T00:00:00Z","timestamp":1624320000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N028228\/1 (PACTMAN)"],"award-info":[{"award-number":["EP\/N028228\/1 (PACTMAN)"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,22]]},"DOI":"10.1145\/3450741.3465252","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T16:35:25Z","timestamp":1624034125000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["A Visual Exploration of Cybersecurity Concepts"],"prefix":"10.1145","author":[{"given":"Miriam","family":"Sturdee","sequence":"first","affiliation":[{"name":"Lancaster University, United Kingdom"}]},{"given":"Lauren","family":"Thornton","sequence":"additional","affiliation":[{"name":"School of Computing and Communications, Lancaster University, United Kingdom"}]},{"given":"Bhagya","family":"Wimalasiri","sequence":"additional","affiliation":[{"name":"Lancaster University, United Kingdom"}]},{"given":"Sameer","family":"Patil","sequence":"additional","affiliation":[{"name":"Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, United States"}]}],"member":"320","published-online":{"date-parts":[[2021,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785882"},{"key":"e_1_3_2_1_2_1","volume-title":"Mental Models of Security Risks","author":"Asgharpour Farzaneh","unstructured":"Farzaneh Asgharpour , Debin Liu , and L.\u00a0 Jean Camp . 2007. Mental Models of Security Risks . In Financial Cryptography and Data Security, Sven Dietrich and Rachna Dhamija (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 367\u2013377. https:\/\/doi.org\/10.1007\/978-3-540-77366-5_34 10.1007\/978-3-540-77366-5_34 Farzaneh Asgharpour, Debin Liu, and L.\u00a0Jean Camp. 2007. Mental Models of Security Risks. In Financial Cryptography and Data Security, Sven Dietrich and Rachna Dhamija (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 367\u2013377. https:\/\/doi.org\/10.1007\/978-3-540-77366-5_34"},{"key":"e_1_3_2_1_3_1","volume-title":"\u00a0C. Nurse","author":"Bada Maria","year":"2019","unstructured":"Maria Bada , Angela\u00a0 M. Sasse , and Jason R . \u00a0C. Nurse . 2019 . Cyber Security Awareness Campaigns : Why do they fail to change behaviour?(2019). arxiv:1901.02672\u00a0[cs.CR] Maria Bada, Angela\u00a0M. Sasse, and Jason R.\u00a0C. Nurse. 2019. Cyber Security Awareness Campaigns: Why do they fail to change behaviour?(2019). arxiv:1901.02672\u00a0[cs.CR]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2018.8709187"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_6_1","volume-title":"Drawing energy: Exploring perceptions of the invisible","author":"Bowden Flora","unstructured":"Flora Bowden , Dan Lockton , Rama Gheerawo , and Clare Brass . 2015. Drawing energy: Exploring perceptions of the invisible . Royal College of Art , London, UK . Flora Bowden, Dan Lockton, Rama Gheerawo, and Clare Brass. 2015. Drawing energy: Exploring perceptions of the invisible. Royal College of Art, London, UK."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2009.934142"},{"key":"e_1_3_2_1_9_1","first-page":"149","article-title":"Antecedents and distinctions between online trust and distrust: Predicting high-and low-risk internet behaviors","volume":"14","author":"Chang Yong-Sheng","year":"2013","unstructured":"Yong-Sheng Chang and Shyh-Rong Fang . 2013 . Antecedents and distinctions between online trust and distrust: Predicting high-and low-risk internet behaviors . Journal of Electronic Commerce Research 14 , 2 (2013), 149 \u2013 166 . Yong-Sheng Chang and Shyh-Rong Fang. 2013. Antecedents and distinctions between online trust and distrust: Predicting high-and low-risk internet behaviors. Journal of Electronic Commerce Research 14, 2 (2013), 149\u2013166.","journal-title":"Journal of Electronic Commerce Research"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.19101\/IJACR.2016.623006"},{"key":"e_1_3_2_1_11_1","first-page":"2","article-title":"Visual methods and quality in information behaviour research: The cases of photovoice and mental mapping","volume":"22","author":"Cox Andrew","year":"2017","unstructured":"Andrew Cox and Melanie Benson . 2017 . Visual methods and quality in information behaviour research: The cases of photovoice and mental mapping . Information Research 22 , 2 (Jun 2017), n2. Andrew Cox and Melanie Benson. 2017. Visual methods and quality in information behaviour research: The cases of photovoice and mental mapping. Information Research 22, 2 (Jun 2017), n2.","journal-title":"Information Research"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173575"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_3_2_1_14_1","volume-title":"The virtual battlefield: Perspectives on cyber warfare, Christian Czosseck and Kenneth Geers (Eds.). Vol.\u00a03","author":"Farivar Cyrus","unstructured":"Cyrus Farivar . 2009. A brief examination of media coverage of cyberattacks (2007\u2013Present) . In The virtual battlefield: Perspectives on cyber warfare, Christian Czosseck and Kenneth Geers (Eds.). Vol.\u00a03 . IOS Press , 182\u2013188. Cyrus Farivar. 2009. A brief examination of media coverage of cyberattacks (2007\u2013Present). In The virtual battlefield: Perspectives on cyber warfare, Christian Czosseck and Kenneth Geers (Eds.). Vol.\u00a03. IOS Press, 182\u2013188."},{"key":"e_1_3_2_1_15_1","volume-title":"Conceptions of Risks and Harms on the Web: A Comparative Study. In CHI \u201902 Extended Abstracts on Human Factors in Computing Systems (Minneapolis, Minnesota, USA) (CHI EA \u201902)","author":"Friedman Batya","unstructured":"Batya Friedman , David Hurley , Daniel\u00a0 C. Howe , Helen Nissenbaum , and Edward Felten . 2002. Users \u2019 Conceptions of Risks and Harms on the Web: A Comparative Study. In CHI \u201902 Extended Abstracts on Human Factors in Computing Systems (Minneapolis, Minnesota, USA) (CHI EA \u201902) . Association for Computing Machinery , New York, NY, USA , 614\u2013615. https:\/\/doi.org\/10.1145\/506443.506510 10.1145\/506443.506510 Batya Friedman, David Hurley, Daniel\u00a0C. Howe, Helen Nissenbaum, and Edward Felten. 2002. Users\u2019 Conceptions of Risks and Harms on the Web: A Comparative Study. In CHI \u201902 Extended Abstracts on Human Factors in Computing Systems (Minneapolis, Minnesota, USA) (CHI EA \u201902). Association for Computing Machinery, New York, NY, USA, 614\u2013615. https:\/\/doi.org\/10.1145\/506443.506510"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.180"},{"key":"e_1_3_2_1_17_1","volume-title":"New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017","author":"Gallagher Kevin","year":"2017","unstructured":"Kevin Gallagher , Sameer Patil , and Nasir Memon . 2017 . New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017 ). USENIX Association, Santa Clara, CA, 385\u2013398. https:\/\/www.usenix.org\/conference\/soups 2017\/technical-sessions\/presentation\/gallagher Kevin Gallagher, Sameer Patil, and Nasir Memon. 2017. New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 385\u2013398. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/gallagher"},{"key":"e_1_3_2_1_18_1","unstructured":"Nicole Gallucci. 2017. We need to talk about all these absurd stock photos of hackers. https:\/\/mashable.com\/2017\/05\/15\/horrible-hacker-stock-photos\/ Accessed: 2021-05-28.  Nicole Gallucci. 2017. We need to talk about all these absurd stock photos of hackers. https:\/\/mashable.com\/2017\/05\/15\/horrible-hacker-stock-photos\/ Accessed: 2021-05-28."},{"key":"e_1_3_2_1_19_1","volume-title":"\u00a0L. Ko","author":"Garae Jeffery","year":"2017","unstructured":"Jeffery Garae and Ryan K . \u00a0L. Ko . 2017 . Visualization and Data Provenance Trends in Decision Support for Cybersecurity. In Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications, Iv\u00e1n Palomares\u00a0Carrascosa, Harsha\u00a0Kumara Kalutarage, and Yan Huang (Eds.). Springer International Publishing , Cham, 243\u2013270. https:\/\/doi.org\/10.1007\/978-3-319-59439-2_9 10.1007\/978-3-319-59439-2_9 Jeffery Garae and Ryan K.\u00a0L. Ko. 2017. Visualization and Data Provenance Trends in Decision Support for Cybersecurity. In Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications, Iv\u00e1n Palomares\u00a0Carrascosa, Harsha\u00a0Kumara Kalutarage, and Yan Huang (Eds.). Springer International Publishing, Cham, 243\u2013270. https:\/\/doi.org\/10.1007\/978-3-319-59439-2_9"},{"key":"e_1_3_2_1_20_1","unstructured":"Deborah Gonzalez. 2014. Managing online risk: Apps mobile and social media security. Butterworth-Heinemann.  Deborah Gonzalez. 2014. Managing online risk: Apps mobile and social media security. Butterworth-Heinemann."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551519837174"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology","author":"B.","unstructured":"Joshua\u00a0 B. Gross and Mary\u00a0Beth Rosson. 2007. Looking for Trouble: Understanding End-User Security Management . In Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology ( Cambridge, Massachusetts) (CHIMIT \u201907). Association for Computing Machinery, New York, NY, USA, 10\u2013es. https:\/\/doi.org\/10.1145\/1234772.1234786 10.1145\/1234772.1234786 Joshua\u00a0B. Gross and Mary\u00a0Beth Rosson. 2007. Looking for Trouble: Understanding End-User Security Management. In Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology (Cambridge, Massachusetts) (CHIMIT \u201907). Association for Computing Machinery, New York, NY, USA, 10\u2013es. https:\/\/doi.org\/10.1145\/1234772.1234786"},{"key":"e_1_3_2_1_23_1","article-title":"Critical visualization: a case for rethinking how we visualize risk and security","volume":"1","author":"Hall Peter","year":"2015","unstructured":"Peter Hall , Claude Heath , and Lizzie Coles-Kemp . 2015 . Critical visualization: a case for rethinking how we visualize risk and security . Journal of Cybersecurity 1 , 1 (12 2015), 93\u2013108. https:\/\/doi.org\/10.1093\/cybsec\/tyv004 10.1093\/cybsec Peter Hall, Claude Heath, and Lizzie Coles-Kemp. 2015. Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1, 1 (12 2015), 93\u2013108. https:\/\/doi.org\/10.1093\/cybsec\/tyv004","journal-title":"Journal of Cybersecurity"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702561"},{"key":"e_1_3_2_1_25_1","first-page":"80","article-title":"Adventures in visual analysis","volume":"5","author":"Hartel Jenna","year":"2017","unstructured":"Jenna Hartel . 2017 . Adventures in visual analysis . Visual Methodologies 5 , 1 (2017), 80 \u2013 91 . https:\/\/doi.org\/10.7331\/vm.v5i1.106 10.7331\/vm.v5i1.106 Jenna Hartel. 2017. Adventures in visual analysis. Visual Methodologies 5, 1 (2017), 80\u201391. https:\/\/doi.org\/10.7331\/vm.v5i1.106","journal-title":"Visual Methodologies"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/1468794117722193"},{"key":"e_1_3_2_1_27_1","volume-title":"Trust, Privacy and Security in Digital Business","author":"Ibrahim Tarik","unstructured":"Tarik Ibrahim , Steven\u00a0 M. Furnell , Maria Papadaki , and Nathan\u00a0 L. Clarke . 2010. Assessing the Usability of End-User Security Software . In Trust, Privacy and Security in Digital Business , Sokratis Katsikas, Javier Lopez, and Miguel Soriano(Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 177\u2013189. https:\/\/doi.org\/10.1007\/978-3-642-15152-1_16 10.1007\/978-3-642-15152-1_16 Tarik Ibrahim, Steven\u00a0M. Furnell, Maria Papadaki, and Nathan\u00a0L. Clarke. 2010. Assessing the Usability of End-User Security Software. In Trust, Privacy and Security in Digital Business, Sokratis Katsikas, Javier Lopez, and Miguel Soriano(Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 177\u2013189. https:\/\/doi.org\/10.1007\/978-3-642-15152-1_16"},{"key":"e_1_3_2_1_28_1","volume-title":"Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion , Rob Reeder , and Sunny Consolvo . 2015 . \u201c... No one Can Hack My Mind \u201d: Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015 ). USENIX Association, Ottawa, 327\u2013346. https:\/\/www.usenix.org\/conference\/soups 2015\/proceedings\/presentation\/ion Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. \u201c...No one Can Hack My Mind\u201d: Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 327\u2013346. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/ion"},{"key":"e_1_3_2_1_29_1","first-page":"60","article-title":"Constructing Cyberterrorism as a Security Threat: A Study of International News Media Coverage","volume":"9","author":"Jarvis Lee","year":"2015","unstructured":"Lee Jarvis , Stuart Macdonald , and Andrew Whiting . 2015 . Constructing Cyberterrorism as a Security Threat: A Study of International News Media Coverage . Perspectives on Terrorism 9 , 1 (2015), 60 \u2013 75 . http:\/\/www.jstor.org\/stable\/26297327 Lee Jarvis, Stuart Macdonald, and Andrew Whiting. 2015. Constructing Cyberterrorism as a Security Threat: A Study of International News Media Coverage. Perspectives on Terrorism 9, 1 (2015), 60\u201375. http:\/\/www.jstor.org\/stable\/26297327","journal-title":"Perspectives on Terrorism"},{"key":"e_1_3_2_1_30_1","volume-title":"Perception of Signal Colours, Symbols, and Words in the Context of Cybersecurity Warnings. Master\u2019s thesis","author":"Jeong Rebecca","year":"2019","unstructured":"Rebecca Jeong . 2019. Children and Adults \u2019 Perception of Signal Colours, Symbols, and Words in the Context of Cybersecurity Warnings. Master\u2019s thesis . Carleton University , Ottawa, Canada . https:\/\/doi.org\/10.22215\/etd\/ 2019 -13469 10.22215\/etd Rebecca Jeong. 2019. Children and Adults\u2019 Perception of Signal Colours, Symbols, and Words in the Context of Cybersecurity Warnings. Master\u2019s thesis. Carleton University, Ottawa, Canada. https:\/\/doi.org\/10.22215\/etd\/2019-13469"},{"key":"e_1_3_2_1_31_1","volume-title":"Mental Models: An Interdisciplinary Synthesis of Theory and Methods","author":"Jones A.","year":"2011","unstructured":"Natalie\u00a0 A. Jones , Helen Ross , Timothy Lynam , Pascal Perez , and Anne Leitch . 2011 . Mental Models: An Interdisciplinary Synthesis of Theory and Methods . Ecology and Society 16, 1 (2011), 13\u00a0pages. http:\/\/www.jstor.org\/stable\/26268859 Natalie\u00a0A. Jones, Helen Ross, Timothy Lynam, Pascal Perez, and Anne Leitch. 2011. Mental Models: An Interdisciplinary Synthesis of Theory and Methods. Ecology and Society 16, 1 (2011), 13\u00a0pages. http:\/\/www.jstor.org\/stable\/26268859"},{"key":"e_1_3_2_1_32_1","volume-title":"User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang , Laura Dabbish , Nathaniel Fruchter , and Sara Kiesler . 2015 . \u201c My Data Just Goes Everywhere :\u201d User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015 ). USENIX Association, Ottawa, 39\u201352. https:\/\/www.usenix.org\/conference\/soups 2015\/proceedings\/presentation\/kang Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \u201cMy Data Just Goes Everywhere:\u201d User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 39\u201352. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/kang"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1551-6709.2010.01108.x"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2016.68"},{"key":"e_1_3_2_1_35_1","volume-title":"IEEE Workshop on Visualization for Computer Security (VizSEC 05)","author":"Komlodi Anita","year":"2005","unstructured":"Anita Komlodi , Penny Rheingans , Utkarsha Ayachit , John\u00a0 R. Goodall , and Amit Joshi . 2005 . A user-centered look at glyph-based security visualization . In IEEE Workshop on Visualization for Computer Security (VizSEC 05) . 21\u201328. https:\/\/doi.org\/10.1109\/VIZSEC.2005.1532062 10.1109\/VIZSEC.2005.1532062 Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John\u00a0R. Goodall, and Amit Joshi. 2005. A user-centered look at glyph-based security visualization. In IEEE Workshop on Visualization for Computer Security (VizSEC 05). 21\u201328. https:\/\/doi.org\/10.1109\/VIZSEC.2005.1532062"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2816839.2816912"},{"key":"e_1_3_2_1_37_1","unstructured":"Selena Larson. 2017. Why do hackers always wear hoodies? Behind the stereotype. https:\/\/money.cnn.com\/2017\/05\/26\/technology\/hacker-hoodie-stereotype-hacking\/index.html Accessed: 2021-05-28.  Selena Larson. 2017. Why do hackers always wear hoodies? Behind the stereotype. https:\/\/money.cnn.com\/2017\/05\/26\/technology\/hacker-hoodie-stereotype-hacking\/index.html Accessed: 2021-05-28."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of NordDesign 2014","author":"Lewis Makayla","year":"2014","unstructured":"Makayla Lewis and Lizzie Coles-Kemp . 2014 . A tactile visual library to support user experience storytelling . In Proceedings of NordDesign 2014 ( Espoo, Finland). 386\u2013395. Makayla Lewis and Lizzie Coles-Kemp. 2014. A tactile visual library to support user experience storytelling. In Proceedings of NordDesign 2014(Espoo, Finland). 386\u2013395."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3170649"},{"key":"e_1_3_2_1_40_1","volume-title":"Lewis and Lizzie Coles-Kemp","author":"M.","year":"2014","unstructured":"Makayla\u00a0 M. Lewis and Lizzie Coles-Kemp . 2014 . Who Says Personas Can\u2019t Dance? The Use of Comic Strips to Design Information Security Personas. In CHI \u201914 Extended Abstracts on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI EA \u201914). Association for Computing Machinery , New York, NY, USA, 2485\u20132490. https:\/\/doi.org\/10.1145\/2559206.2581323 10.1145\/2559206.2581323 Makayla\u00a0M. Lewis and Lizzie Coles-Kemp. 2014. Who Says Personas Can\u2019t Dance? The Use of Comic Strips to Design Information Security Personas. In CHI \u201914 Extended Abstracts on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI EA \u201914). Association for Computing Machinery, New York, NY, USA, 2485\u20132490. https:\/\/doi.org\/10.1145\/2559206.2581323"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12904"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312771"},{"key":"e_1_3_2_1_43_1","volume-title":"Adjunct Proceedings of the International Conference on Persuasive Technology (PERSUASIVE","author":"Mekhail Christine","year":"2014","unstructured":"Christine Mekhail , Leah Zhang-Kennedy , and Sonia Chiasson . 2014 . Visualizations to teach about mobile online privacy . In Adjunct Proceedings of the International Conference on Persuasive Technology (PERSUASIVE 2014). 3\u00a0pages. Christine Mekhail, Leah Zhang-Kennedy, and Sonia Chiasson. 2014. Visualizations to teach about mobile online privacy. In Adjunct Proceedings of the International Conference on Persuasive Technology (PERSUASIVE 2014). 3\u00a0pages."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2011.6059257"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0029"},{"key":"e_1_3_2_1_46_1","volume-title":"A question of trust: The BBC Reith Lectures","author":"O\u2019neill Onora","year":"2002","unstructured":"Onora O\u2019neill . 2002. A question of trust: The BBC Reith Lectures 2002 . Cambridge University Press . Onora O\u2019neill. 2002. A question of trust: The BBC Reith Lectures 2002. Cambridge University Press."},{"key":"e_1_3_2_1_47_1","unstructured":"openIDEO. [n.d.]. How might we reimagine a more compelling and relatable visual language for cybersecurity?https:\/\/www.openideo.com\/challenge-briefs\/cybersecurity-visuals Accessed: 2021-05-28.  openIDEO. [n.d.]. How might we reimagine a more compelling and relatable visual language for cybersecurity?https:\/\/www.openideo.com\/challenge-briefs\/cybersecurity-visuals Accessed: 2021-05-28."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312770"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301653"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2016.7739582"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2671491.2671492"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892574"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29387-1_19"},{"key":"e_1_3_2_1_54_1","unstructured":"Eli Sugarman and Heath Wickline. 2017. The Sorry State of Cybersecurity Imagery. https:\/\/www.lawfareblog.com\/sorry-state-cybersecurity-imagery Accessed: 2021-05-28.  Eli Sugarman and Heath Wickline. 2017. The Sorry State of Cybersecurity Imagery. https:\/\/www.lawfareblog.com\/sorry-state-cybersecurity-imagery Accessed: 2021-05-28."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0109-1"},{"key":"e_1_3_2_1_56_1","unstructured":"Bernardo Malta\u00a0Leite Telles Shapor Naghibzadeh and Carey\u00a0Stover Nachenberg. 2021. User interfaces for presenting cybersecurity data. United States Patent 10958534.  Bernardo Malta\u00a0Leite Telles Shapor Naghibzadeh and Carey\u00a0Stover Nachenberg. 2021. User interfaces for presenting cybersecurity data. United States Patent 10958534."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12635"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073283"},{"key":"e_1_3_2_1_60_1","volume-title":"Exploring Mental Models of Encryption. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018","author":"Wu Justin","year":"2018","unstructured":"Justin Wu and Daniel Zappala . 2018 . When is a Tree Really a Truck? Exploring Mental Models of Encryption. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018 ). USENIX Association, Baltimore, MD, 395\u2013409. https:\/\/www.usenix.org\/conference\/soups 2018\/presentation\/wu Justin Wu and Daniel Zappala. 2018. When is a Tree Really a Truck? Exploring Mental Models of Encryption. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 395\u2013409. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/wu"},{"key":"e_1_3_2_1_61_1","volume-title":"TAPESTRY: Visualizing Interwoven Identities for Trust Provenance. In 2018 IEEE Symposium on Visualization for Cyber Security (VizSec \u201918)","author":"Yang Yifan","year":"2018","unstructured":"Yifan Yang , John Collomosse , Arthi\u00a0Kanchana Manohar , Jo Briggs , and Jamie Steane . 2018 . TAPESTRY: Visualizing Interwoven Identities for Trust Provenance. In 2018 IEEE Symposium on Visualization for Cyber Security (VizSec \u201918) . 1\u20134. https:\/\/doi.org\/10.1109\/VIZSEC.2018.8709236 10.1109\/VIZSEC.2018.8709236 Yifan Yang, John Collomosse, Arthi\u00a0Kanchana Manohar, Jo Briggs, and Jamie Steane. 2018. TAPESTRY: Visualizing Interwoven Identities for Trust Provenance. In 2018 IEEE Symposium on Visualization for Cyber Security (VizSec \u201918). 1\u20134. https:\/\/doi.org\/10.1109\/VIZSEC.2018.8709236"},{"key":"#cr-split#-e_1_3_2_1_62_1.1","doi-asserted-by":"crossref","unstructured":"Leah Zhang-Kennedy Sonia Chiasson and Robert Biddle. 2013. Password advice shouldn't be boring: Visualizing password guessing attacks. In 2013 APWG eCrime Researchers Summit. 1-11. https:\/\/doi.org\/10.1109\/eCRS.2013.6805770 10.1109\/eCRS.2013.6805770","DOI":"10.1109\/eCRS.2013.6805770"},{"key":"#cr-split#-e_1_3_2_1_62_1.2","doi-asserted-by":"crossref","unstructured":"Leah Zhang-Kennedy Sonia Chiasson and Robert Biddle. 2013. Password advice shouldn't be boring: Visualizing password guessing attacks. In 2013 APWG eCrime Researchers Summit. 1-11. https:\/\/doi.org\/10.1109\/eCRS.2013.6805770","DOI":"10.1109\/eCRS.2013.6805770"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2016.1136177"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2016.7487941"},{"key":"e_1_3_2_1_65_1","volume-title":"Recent Developments in Intelligent Computing","author":"Zhao Haisheng","unstructured":"Haisheng Zhao , Wenzhong Tang , Xiaoxiang Zou , Yanyang Wang , and Yueran Zu. 2019. Analysis of Visualization Systems for Cyber Security . In Recent Developments in Intelligent Computing , Communication and Devices, Srikanta Patnaik and Vipul Jain (Eds.). Springer Singapore , Singapore , 1051\u20131061. https:\/\/doi.org\/10.1007\/978-981-10-8944-2_122 10.1007\/978-981-10-8944-2_122 Haisheng Zhao, Wenzhong Tang, Xiaoxiang Zou, Yanyang Wang, and Yueran Zu. 2019. Analysis of Visualization Systems for Cyber Security. In Recent Developments in Intelligent Computing, Communication and Devices, Srikanta Patnaik and Vipul Jain (Eds.). Springer Singapore, Singapore, 1051\u20131061. https:\/\/doi.org\/10.1007\/978-981-10-8944-2_122"}],"event":{"name":"C&C '21: Creativity and Cognition","location":"Virtual Event Italy","acronym":"C&C '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Creativity and Cognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450741.3465252","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3450741.3465252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:41Z","timestamp":1750195721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450741.3465252"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,22]]},"references-count":66,"alternative-id":["10.1145\/3450741.3465252","10.1145\/3450741"],"URL":"https:\/\/doi.org\/10.1145\/3450741.3465252","relation":{},"subject":[],"published":{"date-parts":[[2021,6,22]]},"assertion":[{"value":"2021-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}