TY - GEN
T1 - Adapting personas for use in security visualization design
AU - Stoll, J.
AU - McColgin, D.
AU - Gregory, M.
AU - Crow, V.
AU - Edwards, W. K.
PY - 2008
Y1 - 2008
N2 - The development of security visualization applications must involve the user in the design process in order to create usable systems. However, it is all too easy to lose track of the user during the design and development process, even though upfront investment in extensive user requirements gathering has proven benefits. To address this challenge, we adapt a user-centered design method called personas that enables effective requirements capture for varying scopes of requirements-gathering efforts, and, when used properly, keeps the user involved at every step of the process from design to evaluation.
AB - The development of security visualization applications must involve the user in the design process in order to create usable systems. However, it is all too easy to lose track of the user during the design and development process, even though upfront investment in extensive user requirements gathering has proven benefits. To address this challenge, we adapt a user-centered design method called personas that enables effective requirements capture for varying scopes of requirements-gathering efforts, and, when used properly, keeps the user involved at every step of the process from design to evaluation.
UR - http://www.scopus.com/inward/record.url?scp=84890899538&partnerID=8YFLogxK
M3 - Contribución a la conferencia
AN - SCOPUS:84890899538
SN - 9783540782421
T3 - VizSEC 2007 - Proceedings of the Workshop on Visualization for Computer Security
SP - 39
EP - 52
BT - VizSEC 2007 - Proceedings of the Workshop on Visualization for Computer Security
T2 - 4th International Workshop on Computer Security, VizSec 2007
Y2 - 29 October 2007 through 29 October 2007
ER -