{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T04:42:21Z","timestamp":1726461741572},"reference-count":26,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2013,6,27]],"date-time":"2013-06-27T00:00:00Z","timestamp":1372291200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Information Visualization"],"published-print":{"date-parts":[[2014,10]]},"abstract":" Information officers and network administrators require tools to help them achieve situation awareness about potential network threats. We describe a response to mini-challenge 1 of the 2012 IEEE Visual Analytics Science and Technology challenge in which we developed a visual analytic solution to a network-security situation awareness problem. To support conceptual design, we conducted a series of knowledge elicitation sessions with domain experts. These provided an understanding of the information they needed to make situation awareness judgements as well as a characterisation of those judgements in the form of production rules, which define a parameter we called the \u2018concern level assessment\u2019. The concern level assessment was used to provide heuristic guidance within a visual analytic system called Middlesex Spatial Interactive Visualisation Environment. An analysis of Visual Analytics Science and Technology challenge assessment sessions using Middlesex Spatial Interactive Visualisation Environment provides some evidence that intelligent heuristics like these can provide useful guidance without unduly dominating interaction and understanding. <\/jats:p>","DOI":"10.1177\/1473871613490291","type":"journal-article","created":{"date-parts":[[2013,6,29]],"date-time":"2013-06-29T01:36:33Z","timestamp":1372469793000},"page":"346-360","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Concern level assessment: Building domain knowledge into a visual system to support network-security situation awareness"],"prefix":"10.1177","volume":"13","author":[{"given":"Neesha","family":"Kodagoda","sequence":"first","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Simon","family":"Attfield","sequence":"additional","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Tinni","family":"Choudhury","sequence":"additional","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Chris","family":"Rooney","sequence":"additional","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Glenford","family":"Mapp","sequence":"additional","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Phong H","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Louis","family":"Slabbert","sequence":"additional","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"B L William","family":"Wong","sequence":"additional","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Mahdi","family":"Aiash","sequence":"additional","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Yongjun","family":"Zheng","sequence":"additional","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Kai","family":"Xu","sequence":"additional","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Aboubaker","family":"Lasebae","sequence":"additional","affiliation":[{"name":"Middlesex University, London, UK"}]}],"member":"179","published-online":{"date-parts":[[2013,6,27]]},"reference":[{"key":"bibr1-1473871613490291","doi-asserted-by":"crossref","unstructured":"Cook K, Grinstein G, Whiting M, VAST Challenge 2012: visual analytics for big data. In: 2012 IEEE conference on visual analytics science and technology (VAST), 2012, pp. 251\u2013255. IEEE, http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6400529 (accessed 10 January 2013).","DOI":"10.1109\/VAST.2012.6400529"},{"key":"bibr2-1473871613490291","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7304.001.0001"},{"key":"bibr3-1473871613490291","doi-asserted-by":"crossref","unstructured":"Endsley MR. Toward a theory of situation awareness in dynamic systems. Hum Factors 1995; 37(1): 32\u201364, http:\/\/hfs.sagepub.com\/content\/37\/1\/32.short?rss=1&ssource=mfc (accessed 5 November 2012).","DOI":"10.1518\/001872095779049543"},{"key":"bibr4-1473871613490291","first-page":"113","volume-title":"Expertise out of context: proceedings of the sixth international conference on naturalistic decision making","author":"Klein G","year":"2012"},{"key":"bibr5-1473871613490291","doi-asserted-by":"crossref","unstructured":"Josephson JR, Josephson SG. Abductive inference: computation, philosophy, technology. Cambridge University Press, 1994, p. 320, http:\/\/www.amazon.com\/Abductive-Inference-Computation-Philosophy-Technology\/dp\/0521434610 (accessed 26 November 2012).","DOI":"10.1017\/CBO9780511530128"},{"key":"bibr6-1473871613490291","volume":"99","author":"Axelsson S.","year":"2000","journal-title":"Intrusion detection systems: a survey and taxonomy"},{"issue":"6","key":"bibr7-1473871613490291","first-page":"901","volume":"2","author":"Karthikeyan KR","year":"2010","journal-title":"IJCTE"},{"key":"bibr8-1473871613490291","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2009.5375542"},{"key":"bibr9-1473871613490291","doi-asserted-by":"crossref","unstructured":"Goodall JR and Sowul M. VIAssist: visual analytics for cyber defense. In: 2009 IEEE conference on technologies for homeland security, 2009, pp. 143\u2013150. IEEE, http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=5168026 (accessed 26 November 2012).","DOI":"10.1109\/THS.2009.5168026"},{"first-page":"171","volume-title":"2011 IEEE symposium on computational intelligence in cyber security (CICS)","author":"Ferebee D","key":"bibr10-1473871613490291"},{"key":"bibr11-1473871613490291","unstructured":"Wassink I, Kulyk O, Van Dijk B, Applying a user-centered approach to interactive visualisation design. In: Liere R, Adriaansen T, Zudilova-Seinstra E (eds) Trends in interactive visualization: state-of-the-art survey. London: Springer London, 2009, http:\/\/www.springerlink.com\/index\/10.1007\/978-1-84800-269-2 (accessed 7 November 2012)."},{"key":"bibr12-1473871613490291","unstructured":"Roberts JC. The five design-sheet (FdS) approach for sketching information visualization designs. Eurographics 2011, http:\/\/diglib.eg.org\/EG\/DL\/conf\/EG2011\/education\/029-036.pdf.abstract.pdf (accessed 17 January 2013)."},{"first-page":"43","volume-title":"Proceedings of the SIGCHI conference on Human factors in computing systems","author":"Landay JA","key":"bibr13-1473871613490291"},{"key":"bibr14-1473871613490291","unstructured":"Cooper A, Reimann R, Cronin D. About face 3: the essentials of interaction design. John Wiley & Sons, 2007, p. 648, http:\/\/www.amazon.co.uk\/About-Face-Essentials-Interaction-Design\/dp\/0470084111 (accessed 22 January 2013)."},{"key":"bibr15-1473871613490291","doi-asserted-by":"crossref","unstructured":"Cooke NJ. Varieties of knowledge elicitation techniques. Int J Hum-Comput St 1994; 41(6): 801\u2013849, http:\/\/dx.doi.org\/10.1006\/ijhc.1994.1083 (accessed 20 January 2013).","DOI":"10.1006\/ijhc.1994.1083"},{"key":"bibr16-1473871613490291","unstructured":"De Groot A. Perception and memory versus thought: some old ideas and recent findings. In: Kleinmuntz B (ed.) Problem solving. New York: Wiley, 1966, http:\/\/libra.msra.cn\/Publication\/3559971\/perception-and-memory-versus-thought-some-old-ideas-and-recent-findings (accessed 20 January 2013)."},{"key":"bibr17-1473871613490291","doi-asserted-by":"crossref","unstructured":"Chase WG and Simon HA. The mind\u2019s eye in chess. In: Chase WG (ed.) Cognitive skills and their acquisition. Hillsdale, NJ: Erlbaum, 1973, pp. 141\u2013189.","DOI":"10.1016\/B978-0-12-170150-5.50011-1"},{"key":"bibr18-1473871613490291","first-page":"15","volume-title":"The nature of expertise","author":"Glaser R","year":"1988"},{"key":"bibr19-1473871613490291","doi-asserted-by":"crossref","unstructured":"Hoffman RR, Shadbolt NR, Burton AM, Eliciting knowledge from experts: a methodological analysis. Organ Behav Hum Dec 1995; 62(2): 129\u2013158, http:\/\/dx.doi.org\/10.1006\/obhd.1995.1039 (accessed 20 January 2013).","DOI":"10.1006\/obhd.1995.1039"},{"key":"bibr20-1473871613490291","unstructured":"Cordingley ES. Knowledge elicitation techniques for knowledge-based systems. 1989; Oct 1(cited 2013 Jan 20); 87\u2013175. Available from: http:\/\/dl.acm.org\/citation.cfm?id=94297.94309"},{"key":"bibr21-1473871613490291","doi-asserted-by":"crossref","unstructured":"Diederich J, Ruhmann I, May M. KRITON: a knowledge-acquisition tool for expert systems. Int J Man Mach Stud 1987; 26(1): 29\u201340, http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020737387800330","DOI":"10.1016\/S0020-7373(87)80033-0"},{"key":"bibr22-1473871613490291","first-page":"436","volume-title":"Proceedings of the Eighth international joint conference on Artificial intelligence - Volume 1 (IJCAI\u201983)","volume":"1","author":"Grover MD.","year":"1983"},{"key":"bibr23-1473871613490291","first-page":"435","volume":"94","author":"Tweedie L","year":"1994","journal-title":"CHI"},{"key":"bibr24-1473871613490291","doi-asserted-by":"publisher","DOI":"10.1016\/S0953-5438(98)00022-8"},{"key":"bibr25-1473871613490291","doi-asserted-by":"publisher","DOI":"10.1145\/133160.133216"},{"key":"bibr26-1473871613490291","doi-asserted-by":"crossref","unstructured":"Roberts JC. State of the art: coordinated & multiple views in exploratory visualization. In: Fifth international conference on coordinated and multiple views in exploratory visualization (CMV 2007), 2007, pp. 61\u201371. IEEE, http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=4269947","DOI":"10.1109\/CMV.2007.20"}],"container-title":["Information Visualization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1473871613490291","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1473871613490291","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1473871613490291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T03:51:08Z","timestamp":1726458668000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1473871613490291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,27]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["10.1177\/1473871613490291"],"URL":"https:\/\/doi.org\/10.1177\/1473871613490291","relation":{},"ISSN":["1473-8716","1473-8724"],"issn-type":[{"type":"print","value":"1473-8716"},{"type":"electronic","value":"1473-8724"}],"subject":[],"published":{"date-parts":[[2013,6,27]]}}}