Adapting personas for use in security visualization design

J. Stoll, D. McColgin, M. Gregory, V. Crow, W. K. Edwards

Research output: Contribution to journalConference articlepeer-review

8 Scopus citations

Abstract

The development of security visualization applications must involve the user in the design process in order to create usable systems. However, it is all too easy to lose track of the user during the design and development process, even though upfront investment in extensive user requirements gathering has proven benefits. To address this challenge, we adapt a user-centered design method called personas that enables effective requirements capture for varying scopes of requirements-gathering efforts, and, when used properly, keeps the user involved at every step of the process from design to evaluation.

Original languageEnglish
Pages (from-to)39-52
Number of pages14
JournalMathematics and Visualization
DOIs
StatePublished - 2008
Externally publishedYes
Event4th International Workshop on Computer Security, VizSec 2007 - Sacramento, CA, United States
Duration: Oct 29 2007Oct 29 2007

Fingerprint

Dive into the research topics of 'Adapting personas for use in security visualization design'. Together they form a unique fingerprint.

Cite this