VizSEC 2007 pp 39-52 | Cite as

Adapting Personas for Use in Security Visualization Design

  • J. Stoll
  • D. McColgin
  • M. Gregory
  • V. Crow
  • W. K. Edwards
Part of the Mathematics and Visualization book series (MATHVISUAL)

Abstract

The development of security visualization applications must involve the user in the design process in order to create usable systems. However, it is all too easy to lose track of the user during the design and development process, even though upfront investment in extensive user requirements gathering has proven benefits. To address this challenge, we adapt a user-centered design method called personas that enables effective requirements capture for varying scopes of requirements-gathering efforts, and, when used properly, keeps the user involved at every step of the process from design to evaluation.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • J. Stoll
    • 1
  • D. McColgin
    • 2
  • M. Gregory
    • 2
  • V. Crow
    • 2
  • W. K. Edwards
    • 1
  1. 1.School of Interactive ComputingGeorgia Institute of TechnologyAtlanta
  2. 2.Pacific Northwest National LaboratoryRichland

Personalised recommendations