sented analysis tool may be validation, checking or
updating of the software.
5 CONCLUSIONS
In this work we presented an approach for the easy
creation of an institutional risk profile in Situational
Awareness. Models employed in digital preservation
domain we apply for analysis in cyber SA field.
The main contribution of this work is the employ-
ment of data mining techniques to support risk factors
set up with a few of the most important values for a
particular institution. The resulting risk profile is used
to support cyber analysts with semi-automatic estima-
tion of endangerment level for file formats.
The presented method employs a domain expert
knowledge base collected through a survey to detect
Situational Awareness risks for particular institutions.
Another contribution is support for the visualisa-
tion and analysis of risk factors. To facilitate easier
decision-making, the collected information about the
risk factors is presented as a multidimensional vector.
The proposed methods improve the interpretability of
risk factor information and the quality of the Situa-
tional Awareness process.
We make use of the modified standard score data
mining method to analyse the collected data, and the
cosine similarity calculation to compare risk profiles.
In the evaluation section, different risk factor di-
mensions are exposed. The presented plots demon-
strate coherences in risk factors and help solve prac-
tical Situational Awareness issues. Using the devel-
oped approach and adjusting input data, cyber ana-
lysts have the ability to choose the appropriate risk
factor setting for digital preservation planning in their
institution.
The presented approach is designed to facilitate
decision making for the Situational Awareness using
domain expert knowledge. As future work we plan
to increase the amount and quality of collected expert
information and to extend the tool with additional vi-
sualisation scenarios.
REFERENCES
Ayris, P., Davies, R., McLeod, R., Miao, R., Shenton, H.,
and Wheatley, P. (2008). The life2 final project report.
Final project report, LIFE Project, London, UK.
Barford, P., Dacier, M., Dietterich, T., Fredrikson, M., Gif-
fin, J., Jajodia, S., Jha, S., Li, J., Liu, P., Ning, P., Ou,
X., Song, D., Strater, L., Swarup, V., Tadda, G., Wang,
C., and Yen, J. (2010). Cyber sa: Situational aware-
ness for cyber defense. In Jajodia, S., Liu, P., Swarup,
V., and Wang, C., editors, Cyber Situational Aware-
ness, volume 46 of Advances in Information Security,
pages 3–13. Springer US.
David Tarrant, Steve Hitchcock, L. C. (2011). Where the
semantic web and web 2.0 meet format risk manage-
ment: P2 registry. International Journal of Digital
Curation, 6(1):165–182.
Dehak, N., Dehak, R., Glass, J., Reynolds, D., and Kenny,
P. (2010). Cosine similarity scoring without score
normalization techniques. in Proceedings of Odyssey
2010 - The Speaker and Language Recognition Work-
shop (Odyssey 2010), pages 71–75.
Graf, R. and Gordea, S. (2012). Aggregating a knowledge
base of file formats from linked open data. Proceed-
ings of the 9th International Conference on Preserva-
tion of Digital Objects, poster:292–293.
Graf, R. and Gordea, S. (2013). A risk analysis of file
formats for preservation planning. In Proceedings
of the 10th International Conference on Preservation
of Digital Objects (iPres2013), pages 177–186, Liss-
abon, Portugal. Biblioteca Nacional de Portugal, Lis-
boa.
Graf, R., Gordea, S., and Ryan, H. M. (2015). A tool
for facilitating an institutional risk profile definition.
17th International Conference on Digital Information
Management (ICDIM2015), pages 2998 – 3003.
Hunter, J. and Choudhury, S. (2006). Panic: an integrated
approach to the preservation of composite digital ob-
jects using semantic web services. International Jour-
nal on Digital Libraries, 6, (2):174–183.
Jackson, A. N. (2012). Formats over time: Exploring uk
web history. Proceedings of the 9th International
Conference on Preservation of Digital Objects, pages
155–158.
Kott, A. and Wang, C. (2014). Cyber Defense and Situa-
tional Awareness. Springer International Publishing
Switzerland.
Lawrence, G. W., Kehoe, W. R., Rieger, O. Y., Walters,
W. H., and Kenney, A. R. (2000). Risk management
of digital information: A file format investigation.
Morita, P., Burns C.M., H., and He, Q. (2011). Situa-
tion awareness and risk management understanding
the notification issues. In Stud Health Technol Inform.
PubMed.
Pearson, D. and Webb, C. (2008). Defining file format obso-
lescence: A risky journey. The International Journal
of Digital Curation, Vol 3, No 1:89–106.
Ryan, H. (2014). Occam’s razor and file format endan-
germent factors. In Proceedings of the 11th Interna-
tional Conference on Preservation of Digital Objects
(iPres2014) (accepted for publication), Melbourne,
Australia.
Ryan, H., Graf, R., and Sergiu, G. (2015). Human and
machine-based file format endangerment notification
and recommender systems development. In Proceed-
ings of the 12th International Conference on Digi-
tal Preservation (iPres2015), Chapel Hill, North Car-
olina, USA. UNC.
Salmon, P., Stanton, N., Walker, G., and Green, D. (2006).
Situation awareness measurement: A review of appli-
An Expert System for Facilitating an Institutional Risk Profile Definition for Cyber Situational Awareness
353