The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2009 vol.24)
pp: 32-36
Sadie Creese , University of Warwick
Koen Lamberts , University of Warwick
ABSTRACT
<p>Understanding the mental processes engaged by different representations of risk information is critical for the design of effective online risk communication.</p>
INDEX TERMS
Society Online, risk, online risk assessment, cognitive science, visual representation of risk, communication tools
CITATION
Sadie Creese, Koen Lamberts, "Can Cognitive Science Help Us Make Online Risk More Tangible?", IEEE Intelligent Systems, vol.24, no. 6, pp. 32-36, November/December 2009, doi:10.1109/MIS.2009.111
REFERENCES
1. K. Poulsen, "Slammer Worm Crashed Ohio Nuke Plant Network," SecurityFocus, 19 Aug. 2003, www.securityfocus.com/news/6767.
2. J.K. Burgoon, J.P. Blair, and R.E. Strom, "Cognitive Biases and Nonverbal Cue Availability in Detecting Deception," Human Communication Research, vol. 34, no. 4, 2008, pp. 572–599.
3. P. Slovic, "Perception of Risk," Science, vol. 236, no. 4799, 1987, pp. 280–285.
4. J. Jackson, N. Allum, and G. Gaskell, "Perceptions of Risk in Cyber Space," Trust and Crime in Information Societies, R. Mansell, and R. Collins eds., Edward Elgar, 2005.
5. McAfee Global Threat Report, vol. 2, no. 1, 2008, www.mcafee.com/uk/local_content/reports/gtr_2008.html.
6. D. Balfanz et al., "In Search of Usable Security: Five Lessons from the Field," IEEE Security &Privacy, vol. 2, no. 5, 2004, pp. 19–24.
7. P. Dourish, and D. Redmiles, "An Approach to Usable Security Based on Event Monitoring and Visualization," Proc. Workshop on New Security Paradigms, ACM Press, 2002, pp. 75–81.
8. J. Rode et al., "Seeing Further: Extending Visualization as a Basis for Usable Security," Proc. 2nd Symp. Usable Privacy and Security (SOUPS 06), ACM Press, 2006, pp. 145–155.
9. G. Gigerenzer and D. Goldstein, "Reasoning the Fast and Frugal Way: Models of Bounded Rationality," Psychological Rev., vol. 103, no. 4, 1996, pp. 650–669.
10. D. Kahneman, P. Slovic, and A. Tversky, Judgment under Uncertainty: Heuristics and Biases, Cambridge Univ. Press, 1982.
11. J. Colquitt, B. Scott, and J. Le Pine, "Trust, Trustworthiness, and Trust Propensity: A Meta-analytic Test of their Unique Relationships with Risk Taking and Job Performance," J. Applied Psychology, vol. 92, no. 4, 2007, pp. 909–926.
12. N.D. Weinstein and P.M. Sandman, "Some Criteria for Evaluating Risk Messages," Risk Analysis, vol. 13, no. 1, 1993, pp. 103–114.
13. I.M. Lipkus and J.G. Hollands, "The Visual Communication of Risk," J. Nat'l Cancer Inst. Monographs, vol. 1999, no. 25, 1999, pp. 149–163.
14. N. Stewart, G.D.A. Brown, and N. Chater, "Absolute Identification by Relative Judgment," Psychological Rev., vol. 112, no. 4, 2005, pp. 881–911.
15. J.A. Sparrow, "Graphical Displays in Information Systems: Some Data Properties Influencing the Effectiveness of Alternative Forms," Behaviour &Information Tech., vol. 8, no. 1, 1989, pp. 43–56.
16. C.M. Carswell, "Choosing Specifiers—An Evaluation of the Basic Tasks Model of Graphical Perception," Human Factors, vol. 34, no. 5, 1992, pp. 535–554.
17. J. Ancker et al., "Design Features of Graphs in Health Risk Communication: A Systematic Review," J. Am. Medical Information Assoc., vol. 13, no. 6, 2006, pp. 608–618.
18. G. Gigerenzer and A. Edwards, "Simple Tools for Understanding Risks: From Innumeracy to Insight," British Medical J.,27 Sept. 2003, pp. 741–744.
19. E. Kurz-Milcke, G. Gigerenzer, and L. Martingon, "Transparency in Risk Communication: Graphical and Analog Tools," Ann. New York Academy of Sciences, Apr. 2008, pp. 18–28.
20. G. Gigerenzer and U. Hoffrage, "How to Improve Bayesian Reasoning without Instruction: Frequency Formats," Psychological Rev., vol. 102, no. 4, 1995, pp. 684–704.
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool