October 29, 2007
Conference Paper

Exploiting the User: Adapting Personas for Use in Security Visualization Design

Abstract

It has long been noted that visual representations of complex information can facilitate rapid understanding of data {citation], even with respect to ComSec applications {citation]. Recognizing that visualizations can increase usability in ComSec applications, [Zurko, Sasse] have argued that there is a need to create more usable security visualizations. (VisSec) However, usability of applications generally fall into the domain of Human Computer Interaction (HCI), which generally relies on heavy-weight user-centered design (UCD) processes. For example, the UCD process can involve many prototype iterations, or an ethnographic field study that can take months to complete. The problem is that VisSec projects generally do not have the resources to perform ethnographic field studies, or to employ complex UCD methods. They often are running on tight deadlines and budgets that can not afford standard UCD methods. In order to help resolve the conflict of needing more usable designs in ComSec, but not having the resources to employ complex UCD methods, in this paper we offer a stripped-down lighter weight version of a UCD process which can help with capturing user requirements. The approach we use is personas which a user requirements capturing method arising out of the Participatory Design philosophy [Grudin02].

Revised: February 3, 2009 | Published: October 29, 2007

Citation

Stoll J.C., D.W. McColgin, M.L. Gregory, V.L. Crow, and K. Edwards. 2007. Exploiting the User: Adapting Personas for Use in Security Visualization Design. In VizSec: Workshop on Visualization for Computer Security, edited by JR Goodall; G Conti; KL Ma. New York, New York:Springer. PNNL-SA-57124.