Skip to main content
Article
A Design Methodology and Implementation for Corporate Network Security Visualization: A Modular-Based Approach
AIS Transactions on Human-Computer Interaction
  • Andy Luse, Iowa State University
  • Brian E. Mennecke, Iowa State University
  • Janea Triplett, Iowa State University
  • Nate Karstens, Garmin International Inc.
  • Doug Jacobson, Iowa State University
Publication Date
6-29-2011
Abstract

Research surrounding visualization for computer and network security has produced differing accepted methods for adequately developing security visualization products. The current work proposes a design methodology that melds the research of the three competing frameworks for security visualization development. In addition, a product that incorporates the proposed design methodology is developed, used, and evaluated. Findings show that users of the system believe the system has increased their effectiveness at performing network security tasks and are likely to use such a system in the future.

Citation Information
Andy Luse, Brian E. Mennecke, Janea Triplett, Nate Karstens, et al.. "A Design Methodology and Implementation for Corporate Network Security Visualization: A Modular-Based Approach" (2011) p. 104 - 132
Available at: http://works.bepress.com/douglas-jacobson/1/