

{"id":1705,"date":"2012-10-22T09:37:38","date_gmt":"2012-10-22T14:37:38","guid":{"rendered":"http:\/\/rud.is\/b\/?p=1705"},"modified":"2012-10-22T09:38:05","modified_gmt":"2012-10-22T14:38:05","slug":"putting-cybercrime-infographics-behind-bars","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/","title":{"rendered":"Putting Cybercrime [Infographics] Behind Bars"},"content":{"rendered":"<p>HP &#038; the Ponemon Institute have released their <a href=\"http:\/\/www8.hp.com\/us\/en\/hp-news\/press-release.html?id=1303754#.UIVSpmMj47t\">third annual &#8220;Cost of Cybercrime&#8221; report<\/a> and the web wizards at HP have given us an infographic from it:<\/p>\n<p><center><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1706\" data-permalink=\"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/t-300_ponemon_th-c-tcm245-1304205-ct-tcm245-1085601-32\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg?fit=210%2C395&amp;ssl=1\" data-orig-size=\"210,395\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"T-300_ponemon_th&amp;#8211;C-tcm245-1304205&amp;#8211;CT-tcm245-1085601-32\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg?fit=210%2C395&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg?resize=210%2C395&#038;ssl=1\" alt=\"\" title=\"T-300_ponemon_th--C-tcm245-1304205--CT-tcm245-1085601-32\" width=\"210\" height=\"395\" class=\"alignnone size-full wp-image-1706\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg?w=210&amp;ssl=1 210w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg?resize=159%2C300&amp;ssl=1 159w\" sizes=\"auto, (max-width: 210px) 100vw, 210px\" \/><br \/>(You can see the full size one at the above link)<\/center><\/p>\n<p>While some designers may think that infographic visualizations are not subject to the same scrutiny as &#8220;real&#8221; charts &#038; graphs, I vehemently disagree. In this particular infographic, my eyes were immediately drawn to the donut chart since it&#8217;s usually a poor choice to begin with and many designers make the same error as this one did.<\/p>\n<p><center><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1707\" data-permalink=\"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/attacks\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks.png?fit=385%2C432&amp;ssl=1\" data-orig-size=\"385,432\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"attacks\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks.png?fit=385%2C432&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks.png?resize=385%2C432&#038;ssl=1\" alt=\"\" title=\"attacks\" width=\"385\" height=\"432\" class=\"alignnone size-full wp-image-1707\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks.png?w=385&amp;ssl=1 385w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks.png?resize=267%2C300&amp;ssl=1 267w\" sizes=\"auto, (max-width: 385px) 100vw, 385px\" \/><\/center><\/p>\n<p>&#8220;<em>What&#8217;s wrong with it?<\/em>&#8220;, you ask?  Well, the donut chart is designed to be a modified pie chart which itself is supposed to display components of a whole (i.e. the circle represents 100% and the slices are the fractional components of said 100%). Donut charts are really hard to read since your eye misses the area &#038; angular cues that help to make the distinction between slices.<\/p>\n<p>Since the whole purpose of the &#8220;attacks&#8221; chart is to give you an idea of how bad\/worse 2010\/11\/12 are from each other, it would be better served with a bar chart:<\/p>\n<p><center><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1708\" data-permalink=\"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/attacks-bar\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks-bar.png?fit=546%2C215&amp;ssl=1\" data-orig-size=\"546,215\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"attacks-bar\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks-bar.png?fit=510%2C201&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks-bar.png?resize=510%2C201&#038;ssl=1\" alt=\"\" title=\"attacks-bar\" width=\"510\" height=\"201\" class=\"alignnone size-full wp-image-1708\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks-bar.png?w=546&amp;ssl=1 546w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks-bar.png?resize=300%2C118&amp;ssl=1 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/center><\/p>\n<p>You can immediately see the distinction &#038; increase over time much easier than in the donut. And, if you&#8217;re still not believing that a pie would give you a better visual indicator (yet still be a bad choice since we&#8217;re not really comparing parts of a whole) you be the judge:<\/p>\n<p><center><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1709\" data-permalink=\"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/attacks-pie\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks-pie.png?fit=479%2C279&amp;ssl=1\" data-orig-size=\"479,279\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"attacks-pie\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks-pie.png?fit=479%2C279&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks-pie.png?resize=479%2C279&#038;ssl=1\" alt=\"\" title=\"attacks-pie\" width=\"479\" height=\"279\" class=\"alignnone size-full wp-image-1709\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks-pie.png?w=479&amp;ssl=1 479w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/attacks-pie.png?resize=300%2C174&amp;ssl=1 300w\" sizes=\"auto, (max-width: 479px) 100vw, 479px\" \/><\/center><\/p>\n<p>But, what I may be most upset about is the fact that they released the chart at the end of October, included a spider in the upper-left but <em>didn&#8217;t include a radar plot anywhere in the infographic<\/em>! <code>#spidersarescary :-) <\/code><\/p>\n<p>All infographic criticism aside, I do thank HP &#038; Ponemon for providing the results of their research free of charge for the benefit of the entire infosec community. I look forward to digesting the whole report.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>HP &#038; the Ponemon Institute have released their third annual &#8220;Cost of Cybercrime&#8221; report and the web wizards at HP have given us an infographic from it: (You can see the full size one at the above link) While some designers may think that infographic visualizations are not subject to the same scrutiny as &#8220;real&#8221; [&hellip;]<\/p>\n","protected":false},"author":33,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[24,670,3],"tags":[],"class_list":["post-1705","post","type-post","status-publish","format-standard","hentry","category-charts-graphs","category-infographics","category-information-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Putting Cybercrime [Infographics] Behind Bars - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Putting Cybercrime [Infographics] Behind Bars - rud.is\" \/>\n<meta property=\"og:description\" content=\"HP &#038; the Ponemon Institute have released their third annual &#8220;Cost of Cybercrime&#8221; report and the web wizards at HP have given us an infographic from it: (You can see the full size one at the above link) While some designers may think that infographic visualizations are not subject to the same scrutiny as &#8220;real&#8221; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2012-10-22T14:37:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-10-22T14:38:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/10\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg\" \/>\n<meta name=\"author\" content=\"metricshulk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"metricshulk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/\"},\"author\":{\"name\":\"metricshulk\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/4cb9a3b8bd4594d2ca8934e4dd5cb07d\"},\"headline\":\"Putting Cybercrime [Infographics] Behind Bars\",\"datePublished\":\"2012-10-22T14:37:38+00:00\",\"dateModified\":\"2012-10-22T14:38:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/\"},\"wordCount\":320,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/10\\\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg\",\"articleSection\":[\"Charts &amp; Graphs\",\"infographics\",\"Information Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/\",\"name\":\"Putting Cybercrime [Infographics] Behind Bars - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/10\\\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg\",\"datePublished\":\"2012-10-22T14:37:38+00:00\",\"dateModified\":\"2012-10-22T14:38:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/10\\\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg?fit=210%2C395&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/10\\\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg?fit=210%2C395&ssl=1\",\"width\":\"210\",\"height\":\"395\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/10\\\/22\\\/putting-cybercrime-infographics-behind-bars\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Putting Cybercrime [Infographics] Behind Bars\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/4cb9a3b8bd4594d2ca8934e4dd5cb07d\",\"name\":\"metricshulk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/wphb-cache\\\/gravatar\\\/d6c\\\/d6c2d869b176c31bdbd9963ea54b0b15x96.jpg\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/wphb-cache\\\/gravatar\\\/d6c\\\/d6c2d869b176c31bdbd9963ea54b0b15x96.jpg\",\"contentUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/wphb-cache\\\/gravatar\\\/d6c\\\/d6c2d869b176c31bdbd9963ea54b0b15x96.jpg\",\"caption\":\"metricshulk\"},\"sameAs\":[\"https:\\\/\\\/twitter.com\\\/#!\\\/metricshulk\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/metricshulk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Putting Cybercrime [Infographics] Behind Bars - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/","og_locale":"en_US","og_type":"article","og_title":"Putting Cybercrime [Infographics] Behind Bars - rud.is","og_description":"HP &#038; the Ponemon Institute have released their third annual &#8220;Cost of Cybercrime&#8221; report and the web wizards at HP have given us an infographic from it: (You can see the full size one at the above link) While some designers may think that infographic visualizations are not subject to the same scrutiny as &#8220;real&#8221; [&hellip;]","og_url":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/","og_site_name":"rud.is","article_published_time":"2012-10-22T14:37:38+00:00","article_modified_time":"2012-10-22T14:38:05+00:00","og_image":[{"url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/10\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg","type":"","width":"","height":""}],"author":"metricshulk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"metricshulk","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/"},"author":{"name":"metricshulk","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/4cb9a3b8bd4594d2ca8934e4dd5cb07d"},"headline":"Putting Cybercrime [Infographics] Behind Bars","datePublished":"2012-10-22T14:37:38+00:00","dateModified":"2012-10-22T14:38:05+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/"},"wordCount":320,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/10\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg","articleSection":["Charts &amp; Graphs","infographics","Information Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/","url":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/","name":"Putting Cybercrime [Infographics] Behind Bars - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/#primaryimage"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/10\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg","datePublished":"2012-10-22T14:37:38+00:00","dateModified":"2012-10-22T14:38:05+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/#primaryimage","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg?fit=210%2C395&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/10\/T-300_ponemon_th-C-tcm245-1304205-CT-tcm245-1085601-32.jpeg?fit=210%2C395&ssl=1","width":"210","height":"395"},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Putting Cybercrime [Infographics] Behind Bars"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"]},{"@type":"Person","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/4cb9a3b8bd4594d2ca8934e4dd5cb07d","name":"metricshulk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/wp-content\/wphb-cache\/gravatar\/d6c\/d6c2d869b176c31bdbd9963ea54b0b15x96.jpg","url":"https:\/\/rud.is\/b\/wp-content\/wphb-cache\/gravatar\/d6c\/d6c2d869b176c31bdbd9963ea54b0b15x96.jpg","contentUrl":"https:\/\/rud.is\/b\/wp-content\/wphb-cache\/gravatar\/d6c\/d6c2d869b176c31bdbd9963ea54b0b15x96.jpg","caption":"metricshulk"},"sameAs":["https:\/\/twitter.com\/#!\/metricshulk"],"url":"https:\/\/rud.is\/b\/author\/metricshulk\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-rv","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1786,"url":"https:\/\/rud.is\/b\/2012\/11\/18\/speaking-at-rsa-conference-2013\/","url_meta":{"origin":1705,"position":0},"title":"Speaking At RSA Conference 2013!","author":"hrbrmstr","date":"2012-11-18","format":false,"excerpt":"Earlier this week, @jayjacobs & I both received our acceptance notice for the talk we submitted to the RSA CFP! [W00t!] Now the hard part: crank out a compelling presentation in the next six weeks! If you're interested at all in doing more with your security data, this talk is\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2510,"url":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/","url_meta":{"origin":1705,"position":1},"title":"Re-imagining  @panda_security&#8217;s Q1 2013 Report Pie Charts","author":"hrbrmstr","date":"2013-05-24","format":false,"excerpt":"We infosec folk eat up industry reports and most of us have no doubt already gobbled up @panda_security's recently released [Q1 2013 Report](http:\/\/press.pandasecurity.com\/wp-content\/uploads\/2010\/05\/PandaLabs-Quaterly-Report.pdf) [PDF]. It's a good read (so go ahead and read it, we'll still be here!) and I was really happy to see a nicely stylized chart in\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1572,"url":"https:\/\/rud.is\/b\/2012\/09\/03\/businessweek-slopegraph\/","url_meta":{"origin":1705,"position":2},"title":"Businessweek&#8217;s #Spiffy Rank-order Stock Market Slopegraph","author":"hrbrmstr","date":"2012-09-03","format":false,"excerpt":"Businessweek's bleeding-edge approach to typography, layout and overall design is one of the features that keeps me reading the magazine in print form. The design team also often delves into experiments with data visualization and short-form infographics and the most recent issue (Sept 3, 2012) is no exception. Given my\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1813,"url":"https:\/\/rud.is\/b\/2012\/12\/05\/forbes-graph-makeover-contest-entry-1\/","url_meta":{"origin":1705,"position":3},"title":"Forbes Graph Makeover Contest Entry #1","author":"hrbrmstr","date":"2012-12-05","format":false,"excerpt":"Naomi Robbins is running a graph makeover challenge over at her Forbes blog and this is my entry for the B2B\/B2C Traffic Sources one (click for larger version): And, here's the R source for how to generate it: library(ggplot2) df = read.csv(\"b2bb2c.csv\") ggplot(data=df,aes(x=Site,y=Percentage,fill=Site)) + geom_bar(stat=\"identity\") + facet_grid(Venue ~ .) +\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1438,"url":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/","url_meta":{"origin":1705,"position":4},"title":"2012 WhiteHat Security Website Security Statistics Report Redux","author":"metricshulk","date":"2012-07-02","format":false,"excerpt":"This is an inaugural post for @MetricsHulk, on the condition that there are few \u2013\u00a0if any \u2013\u00a0\"ALL CAPS\" bits. Q3&4 tend to be \"report season\", and @MetricsHulk usually has some critiques, praises, opines and suggestions (some smashes, too) to offer as we are inundated with a blitz of infographics. The\u2026","rel":"","context":"In &quot;AppSec&quot;","block_context":{"text":"AppSec","link":"https:\/\/rud.is\/b\/category\/appsec\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1545,"url":"https:\/\/rud.is\/b\/2012\/08\/06\/just-when-you-thought-it-was-safe-to-make-a-slopegraph\/","url_meta":{"origin":1705,"position":5},"title":"Just When You Thought It Was Safe To Make A Slopegraph","author":"hrbrmstr","date":"2012-08-06","format":false,"excerpt":"Thanks to a nice call-out post link on Flowing Data in my RSS feeds this morning, I found Naomi Robbins' Effective Graphs Forbes blog, perused the archives a bit and came across her post on arrow charts. She presented a nice comparison between (ugh) pie charts, arrow charts and slopegraphs.\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=1705"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1705\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=1705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=1705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=1705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}