Attacking information visualization system usability overloading and deceiving the human

  • Authors:
  • Gregory Conti;Mustaque Ahamad;John Stasko

  • Affiliations:
  • Georgia Institute of Technology;Georgia Institute of Technology;Georgia Institute of Technology

  • Venue:
  • SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aware of the ways in which their system may be manipulated and protect their users from attack. In addition, users should be aware of potential attacks in order to minimize or negate their effect. These attacks target the information visualization system as well as the perceptual, cognitive and motor capabilities of human end users. To identify and help counter these attacks we present a framework for information visualization system security analysis, a taxonomy of visualization attacks and technology independent principles for countering malicious visualizations. These themes are illustrated with case studies and working examples from the network security visualization domain, but are widely applicable to virtually any information visualization system.