Document Type

Article

Publication Date

6-2011

Journal or Book Title

AIS Transactions on Human-Computer Interaction

Volume

3

Issue

2

First Page

104

Last Page

132

Abstract

Research surrounding visualization for computer and network security has produced differing accepted methods for adequately developing security visualization products. The current work proposes a design methodology that melds the research of the three competing frameworks for security visualization development. In addition, a product that incorporates the proposed design methodology is developed, used, and evaluated. Findings show that users of the system believe the system has increased their effectiveness at performing network security tasks and are likely to use such a system in the future.

Comments

This article is from AIS Transactions on Human Computer Interaction 3, no. 2 (2011): 104–132. Use for profit is not permitted.

Copyright Owner

Association for Information Systems

Language

en

File Format

application/pdf

Share

COinS