Document Type
Article
Publication Date
6-2011
Journal or Book Title
AIS Transactions on Human-Computer Interaction
Volume
3
Issue
2
First Page
104
Last Page
132
Abstract
Research surrounding visualization for computer and network security has produced differing accepted methods for adequately developing security visualization products. The current work proposes a design methodology that melds the research of the three competing frameworks for security visualization development. In addition, a product that incorporates the proposed design methodology is developed, used, and evaluated. Findings show that users of the system believe the system has increased their effectiveness at performing network security tasks and are likely to use such a system in the future.
Copyright Owner
Association for Information Systems
Copyright Date
2011
Language
en
File Format
application/pdf
Recommended Citation
Luse, Andy; Mennecke, Brian E.; Triplett, Janea L.; Karstens, Nate; and Jacobson, Doug, "A Design Methodology and Implementation for Corporate Network Security Visualization: A Modular-Based Approach" (2011). Supply Chain Management Publications. 10.
https://lib.dr.iastate.edu/scm_pubs/10
Comments
This article is from AIS Transactions on Human Computer Interaction 3, no. 2 (2011): 104–132. Use for profit is not permitted.