Examining the Contribution of Critical Visualisation to Information Security

Peter Hall, Claude Heath, Lizzie Coles-Kemp, Axel Tanner

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    8 Citations (Scopus)


    This paper examines the use of visualisations in the field of information security and in particular focuses on the practice of information security risk assessment. We examine the current roles of information security visualisations and place these roles in the wider information visualisation discourse. We present an analytic lens which divides visualisations into three categories: journalistic, scientic and critical visualisations. We then present a case study that uses these three categories of visualisations to further support information security practice. Two signicant results emerge from this case study: (1) visualisations that promote critical thinking and reflection (a form of critical visualisation) support the multi-stakeholder nature of risk assessment and (2) a preparatory stage in risk assessment is sometimes needed by service designers in order to establish the service design before conducting a formal risk assessment. The reader is invited to explore the images in the digital version of this paper where they can zoom in to particular aspects of the images and view the images in colour.
    Original languageEnglish
    Title of host publicationNew Security Paradigm Workshop (NSPW)
    Place of PublicationNew York
    PublisherAssociation for Computing Machinery
    Number of pages14
    ISBN (Print)978-1-4503-3754-0
    Publication statusPublished - Sep 2015
    Event2015 New Security Paradigms Workshop, NSPW 2015 - Twente, Netherlands
    Duration: 8 Sep 201511 Sep 2015


    Workshop2015 New Security Paradigms Workshop, NSPW 2015
    Abbreviated titleNSPW


    • EC Grant Agreement nr.: FP7/318003
    • EC Grant Agreement nr.: FP7/2007-2013
    • n/a OA procedure


    Dive into the research topics of 'Examining the Contribution of Critical Visualisation to Information Security'. Together they form a unique fingerprint.

    Cite this