Adapting personas for use in security visualization design

J. Stoll, D. McColgin, M. Gregory, V. Crow, W. K. Edwards

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

The development of security visualization applications must involve the user in the design process in order to create usable systems. However, it is all too easy to lose track of the user during the design and development process, even though upfront investment in extensive user requirements gathering has proven benefits. To address this challenge, we adapt a user-centered design method called personas that enables effective requirements capture for varying scopes of requirements-gathering efforts, and, when used properly, keeps the user involved at every step of the process from design to evaluation.

Original languageEnglish
Title of host publicationVizSEC 2007 - Proceedings of the Workshop on Visualization for Computer Security
Pages39-52
Number of pages14
StatePublished - 2008
Externally publishedYes
Event4th International Workshop on Computer Security, VizSec 2007 - Sacramento, CA, United States
Duration: Oct 29 2007Oct 29 2007

Publication series

NameVizSEC 2007 - Proceedings of the Workshop on Visualization for Computer Security

Conference

Conference4th International Workshop on Computer Security, VizSec 2007
Country/TerritoryUnited States
CitySacramento, CA
Period10/29/0710/29/07

Fingerprint

Dive into the research topics of 'Adapting personas for use in security visualization design'. Together they form a unique fingerprint.

Cite this