visual programming to reduce the amount of opera-
tional knowledge needed and make it easier to create
incident signatures.
Although we present a prototype addressing some
of the open challenges in knowledge-based SA, there
is room for future research. First, it is necessary to
further technologically support the collaboration be-
tween security novices and security experts. This pa-
per presents the first approach to this, but the approach
has to be improved together with potential users and
finally evaluated throughout a user study. A second
research direction is to integrate situational knowl-
edge into SA better. Here, initial approaches already
exist in the area of human-as-a-security-sensor, but
these should be further developed.
REFERENCES
Ackoff, R. L. (1989). From data to wisdom. Journal of
Applied System Analysis, (16):3–9.
Ben-Asher, N. and Gonzalez, C. (2015). Effects of cyber
security knowledge on attack detection. Computers in
Human Behavior, 48:51–61.
Chao, P.-Y. (2016). Exploring students’ computational
practice, design and performance of problem-solving
through a visual programming environment. Comput-
ers & Education, 95:202–215.
Chen, M., Ebert, D., Hagen, H., Laramee, R. S., van Liere,
R., Ma, K.-L., Ribarsky, W., Scheuermann, G., and
Silver, D. (2009). Data, information, and knowledge
in visualization. IEEE Computer Graphics and Appli-
cations, 1(29):12–19.
Chen, T. M., Sanchez-Aarnoutse, J. C., and Buford, J.
(2011). Petri net modeling of cyber-physical attacks
on smart grid. IEEE Transactions on Smart Grid,
2(4):741–749.
Davenport, T. H. and Prusak, L. (2000). Working knowl-
edge: How organizations manage what they know.
Harvard Business School Press, Boston, Mass.
Dietz, M., Vielberth, M., and Pernul, G. (2020). Integrating
digital twin security simulations in the security opera-
tions center. In Proceedings of the 15th International
Conference on Availability, Reliability and Security
(ARES), pages 1–9, New York, NY, USA. ACM.
Eckhart, M. and Ekelhart, A. (2018). Towards security-
aware virtual environments for digital twins. In Pro-
ceedings of the 4th ACM Workshop on Cyber-Physical
System Security - CPSS ’18, pages 61–72. ACM Press.
Fayyad, U., Piatetsky-Shapiro, G., and Smyth, P.
(1996). From data mining to knowledge discovery in
databases. AI Magazine, 17(3):37.
Federico, P., Wagner, M., Rind, A., Amor-Amor
´
os, A.,
Miksch, S., and Aigner, W. (2017). The role of ex-
plicit knowledge: A conceptual model of knowledge-
assisted visual analytics. In Proceedings of the IEEE
Conference on Visual Analytics Science and Technol-
ogy (VAST).
Heartfield, R. and Loukas, G. (2018). Detecting semantic
social engineering attacks with the weakest link: Im-
plementation and empirical evaluation of a human-as-
a-security-sensor framework. Computers & Security,
76:101–127.
Jaeger, L. (2018). Information security awareness: Liter-
ature review and integrative framework. In Proceed-
ings of the 51st Hawaii International Conference on
System Sciences. Hawaii International Conference on
System Sciences.
Loukas, G. (2015). Cyber-Physical Attacks. Butterworth-
Heinemann.
Mahmood, T. and Afzal, U. (2013). Security analytics: Big
data analytics for cybersecurity: A review of trends,
techniques and tools. In 2013 2nd National Confer-
ence on Information Assurance (NCIA), pages 129–
134. IEEE.
Menges, F. and Pernul, G. (2018). A comparative analysis
of incident reporting formats. Computers & Security,
73:87–101.
Nonaka, I. and Takeuchi, H. (1995). The Knowledge Creat-
ing Company. Oxford University Press.
Polanyi, M. (2009). The Tacit Dimension. University of
Chicago Press, Chicago.
Ponsard, C. and Grandclaudon, J. (2020). Guidelines and
tool support for building a cybersecurity awareness
program for smes. In Information Systems Secu-
rity and Privacy, volume 1221 of Communications in
Computer and Information Science, pages 335–357.
Springer, Cham.
Sacha, D., Stoffel, A., Stoffel, F., Kwon, B. C., Ellis, G., and
Keim, D. (2014). Knowledge generation model for
visual analytics. IEEE Transactions on Visualization
and Computer Graphics, 20(12):1604–1613.
S
´
aez-L
´
opez, J.-M., Rom
´
an-Gonz
´
alez, M., and V
´
azquez-
Cano, E. (2016). Visual programming languages in-
tegrated across the curriculum in elementary school.
Computers & Education, 97:129–141.
Sallos, M. P., Garcia-Perez, A., Bedford, D., and Orlando,
B. (2019). Strategy and organisational cybersecurity:
a knowledge-problem perspective. Journal of Intel-
lectual Capital, 20(4):581–597.
Schneier, B. (2015). Secrets and Lies: Digital Security in a
Networked World. John Wiley & Sons, 15. edition.
Schneier, B. (2018). Click here to kill everybody: Security
and survival in a hyper-connected world. W.W. Nor-
ton & Company, New York, 1. edition.
Thalmann, S. and Ilvonen, I. (2020). Why should we in-
vestigate knowledge risks incidents? - lessons from
four cases. In Bui, T., editor, Proceedings of the 53rd
Hawaii International Conference on System Sciences.
Vasileiou, I. and Furnell, S. (2019). Personalising secu-
rity education: Factors influencing individual aware-
ness and compliance. In Information Systems Secu-
rity and Privacy, volume 977 of Communications in
Computer and Information Science, pages 189–200.
Springer, Cham.
Vielberth, M., Menges, F., and Pernul, G. (2019). Human-
as-a-security-sensor for harvesting threat intelligence.
Cybersecurity, 2(1).
Bridging Knowledge Gaps in Security Analytics
107