purposes. We enumerated a number of reasons for
this lack of meaningful difference in Subsection 4.4.
We expect similar results if mental models are applied
to the design of dashboards in other domains than the
cyber security domain.
Further research should investigate cyber security
mental models in more detailed ways. This can be
done first without considering the dashboard design
aspects. A combination of these subjects may seem
more useful after further exploring them on their own.
Some relevant questions to then explore include: (a)
Can the dashboard be used to nurture the right men-
tal model of security attacks in non-experts (like the
mental models of the managers in our study)? From
an educational perspective the important aspect is to
discover misconceptions (since practice makes it not
only perfect but also permanent). The question is to
what extent a dashboard can allow for this nurturing.
In our setting, for example, the additional interactiv-
ity requested by the analyst and the operator could add
more depth/detail, allowing users to verify their own
hypotheses and misconceptions. (b) Identification of
the utility of dashboard for different user groups. Do
analytical people actually need a dashboard? In what
context are dashboards relevant for managers? Here
it might be useful to couple a mental model approach
with task analysis, to identify if and where users with
mistaken mental models need support.
REFERENCES
Asgharpour, F., Liu, D., and Camp, L. J. (2007). Men-
tal Models of Computer Security Risks. In Workshop
on the Economics of Information Security, pages 1–9,
Pittsburgh.
Ben-Ari, M. (1998). Constructivism in computer science
education. ACM SIGCSE Bulletin, 30(1):257–261.
Bertram, D. (2013). Likert scales are the meaning of life.
Technical report.
Craig, K. J. W. (1943). The Nature of Explanation. Cam-
bridge University Press, Cambridge.
CTF365 Blog (2014). Interactive Cyber Attack Map.
Deutsche Telekom AG Honeypot Project (2015). T-Pot: A
Multi-Honeypot Platform.
D
¨
oring, N. and Bortz, J. (2015). Forschungsmethoden und
Evaluation in den Sozial- und Humanwissenschaften.
Springer, Berlin, Heidelberg, 5 edition.
Doyle, J. K. and Ford, D. N. (1998). Mental models con-
cepts for system dynamics research. System Dynamics
Review, 14(1):3–29.
Few, S. (2006). Information Dashboard Design. O’Reilly
Media, North Sebastopol, 1 edition.
Few, S. (2007). Dashboard Confusion Revisited. Perceptual
Edge, pages 1–6.
Fonteyn, M. E., Kuispers, B., and Grobe, S. J. (1993). A De-
scription of Think Aloud Method and Protocol Anal-
ysis. Qualitative Health Research, 3(4):430–441.
George, D. and Mallery, P. (2007). SPSS for Windows Step-
By-Step: A Simple Guide and Reference. Allyn & Ba-
con, 14 edition.
Getbootstrap.com. Bootstrap · The world’s most popular
mobile-first and responsive front-end framework.
Hinckley, J., Hinckley, J., and Robinson, J. G. (2005). The
Big Book of Car Culture: The Armchair Guide to Au-
tomotive Americana. Motorbooks, St. Paul.
Knorr-Cetina, K. (1981). The Manufacture of Knowledge:
An Essay on the Constructivist and Contextual Nature
of Science. Pergamont Press Ltd., Oxford, 1 edition.
Kunz, G. Chartist - Simple responsive charts.
Laugwitz, B., Held, T., and Schrepp, M. (2008). Con-
struction and Evaluation of a User Experience Ques-
tionnaire. In Holzinger, A., editor, 4th Symposium of
the Workgroup Human-Computer Interaction and Us-
ability Engineering of the Austrian Computer Society,
pages 63–76, Graz. Springer Berlin Heidelberg.
Maier, J. (2016). csd: v1.0.
Mayring, P. (2010). Qualitative Inhaltsanalyse. In Mey,
G. and Mruck, K., editors, Handbuch Qualitative
Forschung in der Psychologie, pages 601–613. VS
Verlag f
¨
ur Sozialwissenschaften, Wiesbaden, 1 edi-
tion.
Mayring, P. (2015). Qualitative Inhaltsanalyse Grundlagen
und Techniken. Beltz, Weinheim und Basel, 12 edi-
tion.
McNeil, S. (2015). Visualizing mental models: Understand-
ing cognitive change to suppor teaching and learning
of multimedia design and development. Educational
Technology Research and Development, 63(1):73–96.
Ministerie van Veiligheid en Justitie. What is the NCSC?
— NCSC.
National Cyber Security Center (2014). Cyber Security As-
sessment Netherlands 2014.
Nielsen, J. (1993). Iterative Design of User Interfaces. IEEE
Computer, 26(11):32–41.
Norman, D. A. (2013). The design of everyday things: Re-
vised and expanded edition. Basic books.
Trend Micro Incorporated (2015). Report on Cybersecurity
and Critical Infrastructure in the Americas.
Typicaljoe. TaffyDB - The JavaScript Database.
Wash, R. and Rader, E. (2011). Influencing Mental Models
of Security: A Research Agenda. Proc. of the 2011
workshop on New security paradigms, pages 57–66.
Wired UK (2015). Infoporn: Cyberattacks have created an
invisible but vast war zone.
Yurdugul, H. (2008). Minimum Sample Size for Cronbach’s
Coefficient Alpha: A Monte-Carlo Study. Hacettepe
University Journal of Education, 35:397–405.
Influence of Mental Models on the Design of Cyber Security Dashboards
139