Mathematics and Visualization
DOI: 10.1007/978-3-540-78243-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Adapting Personas for Use in Security Visualization Design

Abstract: The development of security visualization applications must involve the user in the design process in order to create usable systems. However, it is all too easy to lose track of the user during the design and development process, even though upfront investment in extensive user requirements gathering has proven benefits. To address this challenge, we adapt a user-centered design method called personas that enables effective requirements capture for varying scopes of requirements-gathering efforts, and, when u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
2

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 15 publications
0
9
0
2
Order By: Relevance
“…During this survey, we found some initiatives that address the evaluation of information visualization for network and service management [168] [22] [169]. However, all these efforts are focused on security issues.…”
Section: Sdnmentioning
confidence: 99%
See 1 more Smart Citation
“…During this survey, we found some initiatives that address the evaluation of information visualization for network and service management [168] [22] [169]. However, all these efforts are focused on security issues.…”
Section: Sdnmentioning
confidence: 99%
“…Stoll et al [169] used the Personas Method, which consists of identifying and capturing significant details that shape the users' needs. In summary, the persona is a fictional character that simulates a real one.…”
Section: Sdnmentioning
confidence: 99%
“…Any literature used as guidance to develop the actual tools is listed in Table 3.1. [27], [29], [30], [31], [32] T: [33], [34], [35], [36], [37], [38], [39] V: [38] N Analytical Hierarchical Process [40], [41], [42]…”
Section: Methodsmentioning
confidence: 99%
“…The combination of semi-structured interviewing with a conceptual mapping approach was taken, incorporating one or more documented task-analysis approaches. The implemented approach drew heavily from "Working minds: a practitioner's guide to cognitive task analysis" [32], as well as [27][29][30] [31]. Selected questions used in the semi-structured interviews were taken directly from these works.…”
Section: Objectives and Methodsmentioning
confidence: 99%
See 1 more Smart Citation