Actions for Visual communication for cybersecurity: : beyond awareness to advocacy
Visual communication for cybersecurity: : beyond awareness to advocacy / N.E. van Deursen
- Author
- Van Deursen, N.E.
- Published
- Gistrup, Denmark : River Publishers, [2020]
[Piscataqay, New Jersey] : IEEE Xplore, [2020] - Physical Description
- 1 PDF (169 pages) : illustrations (chiefly color).
- Additional Creators
- IEEE Xplore (Online service) and River Publishers
Access Online
- Series
- Restrictions on Access
- Restricted to subscribers or individual electronic text purchasers.
- Contents
- INTRODUCTION 7 PART I: COMMUNICATION PROBLEMS AND HOW TO FIX THEM 13 1. Image and stereotypes 15 2. Awareness campaigns: disconnected and astray 17 3. Gobbledygook 20 4. The way forward 25 4.1 Visual literacy 25 4.2 Design thinking 29 5. Conclusion 31 PART II: COMMUNICATION THEORY 33 6. Introduction 35 7. How people learn 36 7.1 Bloom's taxonomy 36 7.2 Learning styles 38 7.3 Security education, training, and awareness 39 7.4 Lessons from phishing simulations 40 8. Context in which communication takes place 42 8.1 Organizational structure 42 8.2 Organizational culture and policies 44 8.3 Internal communication 47 8.4 Stakeholder theory 49 8.5 Communication privacy management theory 51 9. How people are persuaded 53 9.1 Marketing 53 9.2 Rhetorical theory, framing, and narrative paradigm/storytelling 54 9.3 Elaboration likelihood model 56 9.4 Cognitive dissonance theory 58 9.5 Nudge theory 60 9.6 Theory of planned behaviour 61 10. Message presentation 63 10.1 Gestalt principles 63 10.2 Repetition and habituation 65 10.3 Semiotics 66 10.4 Personal branding 68 11. Conclusion 70 PART III: VISUAL COMMUNICATION IN THE CISO OFFICE 71 12. Introduction 73 13. Visualizing hierarchy 75 14. Visualizing flow and direction 82 15. Visualizing whole, loose, and connected concepts 99 16. Visual activities 111 17. Visualizing with metaphors 116 18. Visualizing with style and colour 123 19. Infographics 131 20. Cybersecurity art 134 PART IV: WORKBOOK 139 21. Introduction 141 22. Activity 1: Stakeholder map 143 Assignment 143 Step 1: Understanding 143 Step 2: Define the goal 144 Steps 3 and 4: Ideas and prototypes 145 Step 5: Test and improve 147 23. Activity 2: Visual dictionary 148 Assignment 148 Step 1: Understanding and empathizing 149 Step 2: Define the goal 149 Step 3: Let your ideas out! 150 Step 4 and Step 5: Prototype and test 151 A FINAL NOTE 153 BIBLIOGRAPHY 155 IMAGES AND CREDITS 167
- Summary
- Cybersecurity needs a change in communication. It is time to show the world that cybersecurity is an exciting and diverse field to work in. Cybersecurity is not only about hackers and technical gobbledygook. It is a diverse field of work with a lot of collaboration with other disciplines. Over the years, security professionals have tried different awareness strategies to promote their work and to improve the knowledge of their audience but without much success. Communication problems are holding back advances in in the field. Visual Communication for Cybersecurity explores the possibilities of visual communication as a tool to improve the communication about cybersecurity and to better connect with non-experts. Visual communication is useful to explain complex topics and to solve complex problems. Visual tools are easy to share through social media and have the possibility to reach a wide audience. When applied strategically, visual communication can contribute to a people-centric approach to security, where employees are encouraged to actively engage in security activities rather than simply complying with the policies. Cybersecurity education does not usually include communication theory or creative skills. Many experts think that it is not part of their job and is best left to the communication department or they think that they lack any creative talent. This book introduces communication theories and models, gives practical tips, and shows many examples. The book can support students in cybersecurity education and professionals searching for alternatives to bullet-point presentations and textual reports. On top of that, if this book succeeds in inspiring the reader to start creating visuals, it may also give the reader the pleasure of seeing new possibilities and improving their performance. The book is divided into different parts for readers with different interests. There is no need to read the book from cover to cover; the chapters are organized thematically. Readers that are interested in how to apply communication theory to cybersecurity will enjoy the chapters about learning, the context in which communication takes place, and how people are persuaded. Readers that are looking for inspiration and examples of how to use visuals in their daily tasks go straight to the third section of the book. The last section is a workbook that will help the reader to take the first steps towards using visual communication at work.
- Subject(s)
- Genre(s)
- ISBN
- 9788770220897 electronic
8770220905 hardcover
9788770220903 hardcover - Bibliography Note
- Includes bibliographical references.
- Other Forms
- Also available in print.
- Technical Details
- Mode of access: World Wide Web
View MARC record | catkey: 37102965