Advertisement

Information Security Application Design: Improving Signal-to-Noise Ratio

  • Saurabh DuttaEmail author
  • Ger Joyce
Conference paper
  • 1k Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 501)

Abstract

The clear presentation of critical Information Security insights is a key challenge for Information Security application design. If implemented incorrectly, evidence of a data breach might be lost against the background of unimportant information. Consequently, it is vital for Information Security application design teams to deliver insights, not simply a lot of data, that enables Information Security teams to quickly secure their organization’s environments more completely. This paper discusses a Human-Centric approach undertaken to reduce Information Density, and to increase Visual Priority with a view to surfacing key insights quickly within Nexpose, Rapid7’s Vulnerability Management application.

Keywords

Human factors Information security Application design 

Notes

Acknowledgments

Rapid7 would like to thank our customers that took time out of their busy schedules to assist the Product Management and User Experience teams during the recent Nexpose Vulnerability Management application re-design effort.

References

  1. 1.
    Tobias, S.: The year in cyberattacks. http://www.newsweek.com/2014-year-cyber-attacks-295876 (2014)
  2. 2.
    Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Holden, K., Lidwell, W., Butler, J.: Universal principles of design, revised and updated: 125 ways to enhance usability, influence perception, increase appeal, make better design decisions. Rockport Publishers, USA (2010)Google Scholar
  4. 4.
    Tufte, E.R.: Visual display of quantitative information. Graphics Press, USA (1983)Google Scholar
  5. 5.
    Maguire, M.: Using human factors standards to support user experience and agile design. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8009 LNCS, 185–194 (2013)Google Scholar
  6. 6.
    Kim, J.W.: Human computer interaction. Ahn graphics (2012)Google Scholar
  7. 7.
    Gothelf, J., Seiden, J. Lean UX: Applying lean principles to improve user experience. O’Reilly Media, Inc, USA (2013)Google Scholar
  8. 8.
    Cooper, A.: The inmates are running the asylum: why high tech products drive us crazy and how to restore the sanity. Macmillan, UK (1999)Google Scholar
  9. 9.
    Hourihan, M.: Taking the “You” out of user: my experience using personas. Boxes and Arrows. http://www.boxesandarrows.com/archives/taking_the_you_out_of_user_my_experience_using_personas.php (2004)
  10. 10.
    Negru, S., Buraga S.: Towards a conceptual model for describing the personas methodology. In: Proceedings of ICCP’12. IEEE (2012)Google Scholar
  11. 11.
    Creswell, J.W.: Research design: qualitative, quantitative, and mixed methods approaches. SAGE Publications, USA (2013)Google Scholar
  12. 12.
    Brooke, J.: SUS-A quick and dirty usability scale. Usability Eval. Indus. 189(194), 4–7 (1996)Google Scholar
  13. 13.
    Sauro, J., Dumas, J.: Comparison of three one-question, post-task usability questionnaires. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, 1599–1608 (2009)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Rapid7BostonUSA
  2. 2.School of Computer ScienceUniversity of HertfordshireHatfieldUK

Personalised recommendations