Skip to main content

Feasibility of Leveraging an Adaptive Presentation Layer for Cyber Security Visualizations

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity (AHFE 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 593))

Included in the following conference series:

  • 2023 Accesses

Abstract

The balance between end user and software engineer is important to the usage and development of software. Finding this balance, in which the end user can access needed information without overly complicated displays, a time-consuming labyrinth of clicks, and the engineer can implement the display concisely is difficult. Typically, end users desire complex displays that allow for fluid movement to the answers they need. However, accomplishing this can be time consuming for the engineer because complex displays require hard-coded GUIs. Depending on the amount of unique end – users, these issues can multiply because every user role could need a unique, complex display that will require hard coding from the engineer. However, through the usage of the Service Oriented Architecture (SOA) a solution may exist. This architectural style has been leveraged in developing an “adaptive presentation layer” pattern that allows for complex GUIs to be derived without the need of hard coding. This solution was developed for a domain that needed role specific information for map clients; however, other user interface clients have not been applied to this pattern. Therefore, to examine the viability of this solution, it must be applied in other domains using various UI clients. The cyber security domain provides suitable platform to research this solution because of the necessity to monitor several entities of data concurrently and ensure that those monitoring the data can quickly attain the need information. A successful implementation could provide a viable solution in the development of future cyber security interfaces.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rand Group: Don’t Just Build a Solution. Get it Adopted. Rand Group (2017). https://www.randgroup.com/about/methodology/user-adoption-methodology/. Accessed Mar 2017

  2. Fink, G., North, C.L., Endert, A., Rose, S.: Visualizing cyber security: usable workspaces. In: 2009 6th International Workshop on Visualization for Cyber Security, Atlantic City (2009)

    Google Scholar 

  3. Pirolli, P., Card, S.: Information foraging in information access environments. In: SIGCHI Conference on Human Factors in Computing Systems, Denver (1995)

    Google Scholar 

  4. Fink, G., Correa, R., North, C.: System Administrators and their Security Awareness Tools (2005). http://people.cs.vt.edu/~finkga/Research%20Defense/System%20Admin. Accessed Mar 2017

  5. Risch, J.S., Rex, D.B., Dowson, S.T., May, R.A., Moon, B.D.: The STARLIGHT information visualization system. In: IEEE Conference on Information Visualization (IV 1997), Phoenix (1997)

    Google Scholar 

  6. Roth, S., Lucas, P., Senn, J., Gomberg, C., Burks, M., Stroffolin, P., Kolojejchick, J., Dunmire, C.: Visage: A User Interface Environment for Exploring Information. IEEE, San Fanscisco (2002)

    Google Scholar 

  7. North, C., Shneiderman, B.: Snap-Together Visualization: A User Interface for Coordinating Visualizations via Relational Schemata. University of Maryland, Human-Computer eInteraction Lab & Department of Computer Science, College Park (2000)

    Google Scholar 

  8. Lavigne, V., Gouin, D.: Applicability of visual analytics to defence and security operations. In: 16th International Command and Control Research and Technology Symposium, Quebec City (2011)

    Google Scholar 

  9. Zaientz, J.D., Hultner, M., Ray, D., Hamel, L.: An enterprise service set for adaptive role-relevant operational displays. In: Defense Security and Sensing, Orlando (2011)

    Google Scholar 

  10. Satchell, T., Dormish, S., Parker, A.: Creating a Joint Common Operational Picture. Society of American Military Engineer (2017). http://themilitaryengineer.com/index.php/tme-articles/tme-online-exclusive-articles/item/248-creating-a-joint-common-operational-picture. Accessed Mar 2017

  11. Channabasavaiah, K., Tuggle, E., Holley, K.: The case for developing a service-oriented architecture. IBM developerWorks, 16 December 2003. https://www.ibm.com/developerworks/library/ws-migratesoa/. Accessed Mar 2017

  12. Link, S., Jakobs, F., Neer, L., Abeck, S.: Architecture of and Migration to SOA’s Presentation Layer. Cooperation and Management, Universitat, Karlsruhe

    Google Scholar 

  13. Arsanjani, A.: Service - oriented modeling and architecture: how to identify, specify, and realize services fot your SOA. IBM (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lauren Massey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Massey, L., Seker, R., Nicholson, D. (2018). Feasibility of Leveraging an Adaptive Presentation Layer for Cyber Security Visualizations. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2017. Advances in Intelligent Systems and Computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60585-2_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60584-5

  • Online ISBN: 978-3-319-60585-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics