Unlocking User-Centered Design Methods for Building Cyber Security Visualizations
|
|
|
- Paula Morrison
- 10 years ago
- Views:
Transcription
1 Unlocking User-Centered Design Methods for Building Cyber Security Visualizations Sean McKenna 1,2, Diane Staheli 2, Miriah Meyer 1 1 University of Utah 2 MIT Lincoln Laboratory The Lincoln Laboratory portion of this work is sponsored by the Assistant Secretary of Defense for Research & Engineering under Air Force Contract FA C Opinions, interpretations, conclusions, and recommendations are those of the authors and are not necessarily endorsed by the United States Government.
2 motivation user-centered design: incorporate user needs for cyber security: user-centered design methods have been used e.g. cyber command gauge cluster [Erbacher 2012] significant challenges for cyber security 2
3 design methods can overcome overcome limited limited time time and access to users and access to users 3
4 qualitative coding redesign personas data sketches dashboard 4
5 redesign of a software tool cyber security firm hired our team: evaluate usability find right visualizations team was new to cyber security and limited access to users performed literature review to begin to understand this space 5
6 cyber security dashboard facilitate communication of cyber information different goals: identify users compare options previous work focused on analysts as users 6
7 qualitative coding 7
8 we had too much information! detailed analysis of 3 papers: cognitive task analysis (CTA) key focus on users qualitative coding: structure, organizing and consolidating information [Strauss & Corbin 1990] process: find quotes, assign codes, meet to agree, and adapt codes 8
9 results of qualitative coding: 9
10 synthesized codes into design opportunities: e.g. temporal visualization prioritized opportunities and iterated into a mockup interface cyber security firm: developer made changes evaluation (A/B testing) deployed new version 10
11 reflections: found user needs with limited access to users effective method since resulted in a deployed tool cannot replace access to real users usage recommendation: start small, expand your scope & code papers from appropriate venues: e.g. VizSec, VIS, CHI, HFES, Behavior & Information Technology, Computers & Security, FIRST, HST, AMCIS, SAM, CyCon, FloCon, CogSIMA, DHS CATCH, HCI HAS, CTS SECOTS 11
12 personas 12
13 what is a persona? archetypes of users [Martin & Hanington 2012] to build personas: conducted interviews across various stakeholders identified four types of personas: analyst, manager, director of IT, and a CEO specific to a cyber security dashboard 13
14 14
15 used personas to target users: analysts and managers focus saved time crafted ideas for a dashboard, prioritized against personas first prototype produced not deployed yet though 15
16 reflections: limited our design focus to certain users personas could be used in future projects usage recommendation: talk with real users, if possible, to build personas otherwise, use existing research, like qualitative coding 16
17 data sketches 17
18 what is a data sketch? a quick and dirty visualization [Lloyd & Dykes 2011] acquire data: obtained a network flow dataset from an analyst at our university visualize data: brainstorm various ways to encode what is the best way to represent data on a dashboard? produced 20 data sketches using Python, Tableau, Gephi, and D3.js 18
19 19
20 feedback with analyst: avoid complex visualizations clear aggregation iterated on the design evaluation: tested usability deployed to users 20
21 reflections: effective for comparing multiple encodings worked well for a use-case of a dashboard complex visualizations may be useful for analysis usage recommendation: repurpose the tools you know and experiment with new ones: e.g. Python, Tableau, Gephi, D3.js, Processing, Excel, Spotfire, Arcsight, Splunk 21
22 design methods can overcome overcome limited limited time time and access to users and access to users qualitative coding redesign personas data sketches dashboard 22
23 to find out more: acknowledgements: Jonzy, Dan Bowden, Tamara Denning, staff members at MIT Lincoln Laboratory, Dominika Mazur, Matthew Parkin, and James Agutter 23
The USER & The Design Process
The USER & The Design Process Jane Pirone User Friendly User Centered Design UX (User Experience) User Testing Usability UI (User Interface) why should we care so much about the USER? oh and what about
The IconProcess: A Web Development Process Based on RUP
The IconProcess: A Web Development Process Based on RUP Katherine Marshak IconMedialab, Director of Process Development [email protected] Agenda» The legacy of web development processes
How To Design A Website For The Elderly
CHAPTER THREE USER CENTERED DESIGN APPROACH 3.1 Introduction This chapter focuses on two main sections that are about user centered approach and applying this approach to design of the Blue Air Travel
By Peter Merholz, http://peterme.com. If you use it, please attribute it. Thanks.
Ideation/Generation Definition / Requirements Iterative design Implementation Ideation/Generation Definition / Requirements Iterative design Implementation Understand the market Customer empathy Ideation/Generation
Announcements. Project status demo in class
Web Design cs465 Announcements Project status demo in class Why? You will likely be involved in Web design You have many of the skills necessary Understand similarities and differences between GUI design
Prototyping Techniques for
Prototyping Techniques for Better Web Design Billie Johnson, CBAP, CSM [email protected] Agenda Overview of Prototyping Technique Prototyping Progression Paper vs. Digital Prototypes Conclusion Seminar
Improving Government Websites and Surveys With Usability Testing and User Experience Research
Introduction Improving Government Websites and Surveys With Usability Testing and User Experience Research Jennifer Romano Bergstrom, Jonathan Strohl Fors Marsh Group 1010 N Glebe Rd., Suite 510, Arlington,
USER EXPERIENCE DESIGNER & RESEARCHER
USER EXPERIENCE DESIGNER & RESEARCHER Hello! My name is Syed Lagoon and I am a UX Designer & Researcher with a broad UX skillset that ranges from user research and competitive analysis to rapid wireframing
Databricks. A Primer
Databricks A Primer Who is Databricks? Databricks was founded by the team behind Apache Spark, the most active open source project in the big data ecosystem today. Our mission at Databricks is to dramatically
Business Analysis Essentials
Understand the business analyst's role and responsibilities in a successful project. In this introductory course, you'll delve into the role and responsibilities of the business analyst (BA)- the communication
Exploring Mobile Space Stanfy Publications. Mobile Application UI/UX Prototyping Process
Exploring Mobile Space Stanfy Publications Mobile Application UI/UX Prototyping Process Prototyping is an important part of an iterative design process where each screen is refined until it achieves the
Databricks. A Primer
Databricks A Primer Who is Databricks? Databricks vision is to empower anyone to easily build and deploy advanced analytics solutions. The company was founded by the team who created Apache Spark, a powerful
SITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
Environmental Decision Support Systems: A Human Factors Perspective
Environmental Decision Support Systems: A Human Factors Perspective Prof. Dr. Steven P. Frysinger James Madison University Harrisonburg, Virginia USA and cismet GmbH EDSS Decision Support Systems attempt
Evidentiary Integrity for Incident Response (EIIR)
CYBER SECURITY DIVISION 2014 PRINCIPAL INVESTIGATORS MEETING Evidentiary Integrity for Incident Response (EIIR) Exelis Inc., Information Systems December 2014 This material is based on research sponsored
Elliott Romano. UX Designer. 443.226.5761 [email protected] elliottromano.com
Elliott Romano UX Designer 443.226.5761 [email protected] elliottromano.com Hello World. Allow me to introduce myself... I am a user experience designer with an art-school background, currently
USER EXPERIENCE TRAINING CLASSES New York City
USER EXPERIENCE TRAINING CLASSES City webcredible > user experience training classes - NYC Want to be a digital superstar? Want a team full of digital superstars? You re in the right place. Get in touch
Requirements Management Database
Project Whitepaper Compliance with Pragmatic Marketing s That Work, LLC Project Whitepaper - Pragmatic Marketing's That Work Page 1 of 16 Introduction The Database has been designed for maximum flexibility
UX for Successful Products
UX for Successful Products CRAFTING THE BEST EXPERIENCE FOR YOUR USERS Our 360 solution enhance your product experience. We create digital experiences users want to interact with, which is the core of
Moving Target Reference Implementation
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Moving Target Reference Implementation Software Engineering Institute, Carnegie Mellon University Andrew O. Mellinger December 17, 2014
Situational Awareness Through Network Visualization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Situational Awareness Through Network Visualization Pacific Northwest National Laboratory Daniel M. Best Bryan Olsen 11/25/2014 Introduction
When is Agile the Best Project Management Method? Lana Tylka
When is Agile the Best Project Management Method? Lana Tylka Staged Incremental Deliveries Prototypes Plan Develop Design Deploy Test Maintain Sequential Steps Multiple Iterations Waterfall Sprints, Spirals
Executive Q&A: Learning Maps; Innovative Tools For Customer Experience Training
Customer Experience Professionals June 18, 2014 Executive Q&A: Learning Maps; Innovative Tools For Customer Experience Training by Samuel Stern with Harley Manning and Dylan Czarnecki Why Read This Report
CUSTOMER EXPERIENCE DESIGN CUSTOMER EXPERIENCE DESIGN
02 03 FIFTH QUADRANT Established in 1998, Fifth Quadrant is a Management Consultancy and Analyst Organisation specialising in: METHODOLOGIES USED CUSTOMER EXPERIENCE STRATEGY CUSTOMER EXPERIENCE RESEARCH
DESIGNING FOR THE USER INSTEAD OF YOUR PORTFOLIO
DESIGNING FOR THE USER INSTEAD OF YOUR PORTFOLIO AN INTRODUCTION TO USER EXPERIENCE DESIGN Wade Shearer wadeshearer.com Wade Shearer User Experience Designer and Evangelist Vivint, Omniture, LDS Church,
Experience managing the delivery, ongoing success, and continuous improvement of one or more digital products and/or platforms.
The labor categories that are within scope of this Multiple Award Blanket Purchase Agreement are the following: Category 1 - Product Manager Category 2 - Technical Architect Category 3 - Interaction Designer
Is to define and implement a design strategy with deep understanding of user and business needs that makes user interfaces and experiences great.
OBJECTIVE: Is to define and implement a design strategy with deep understanding of user and business needs that makes user interfaces and experiences great. SUMMARY: Have 6.5 years of experience as a UX
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
A DIGITAL SOLUTIONS AGENCY. 2212 Queen Anne Ave N. Ste. 337 Seattle WA, 98109 206.280.3422 [email protected] www.peelinteractive.
A DIGITAL SOLUTIONS AGENCY We are an Enteractive Agency! We are a full service digital production agency located in Seattle Washington. We specialize in developing digital marketing for the entertainment
Agile for Product Owners
Agile for Product Owners Quickly grasp the keys to Agile practice and become an empowered product owner and a supportive partner of your Agile development team. Utilizing an Agile approach effectively
Post-Implementation EMR Evaluation for the Beta Ambulatory Care Clinic Proposed Plan Jul 6/2012, Version 2.0
1. Purpose and Scope Post-Implementation EMR Evaluation for the Beta Ambulatory Care Clinic Proposed Plan Jul 6/2012, Version 2.0 This document describes our proposed plan to conduct a formative evaluation
eorgette ullivan Portfolio
Portfolio Experience Designer: Design Research, Interaction and Visual Design georgettes.com [email protected] 512-362-8078 Innovating Enterprise IT Management Software Description Create a reference
SLDS Workshop Summary: Data Use
SLDS Workshop Summary: Data Use Developing a Data Use Strategy This publication aims to help states detail the current status of their State Longitudinal Data System (SLDS) data use strategy and identify
Software Center. Customer Data and Ecosystem Driven Development
Software Center Customer Data and Ecosystem Driven Development Research Themes 1. Continuous Delivery 2. Continuous Architecture 3. Development Metrics 4. Customer Data and Ecosystem Driven Engineering
White Paper: Leveraging Web Intelligence to Enhance Cyber Security
White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence
Harnessing Voice of the Customer for Incremental Innovation
A three-page excerpt from our 15-page Best Practice Guidebook: Harnessing Voice of the Customer for Incremental Innovation 1 Best Practice Guidebook Harnessing Voice of the Customer for Incremental Innovation
Current and Future State of Health Informatics for Veterans Health Administration
Current and Future State of Health Informatics for Veterans Health Administration Theresa Cullen, M.D., MS Deputy Director, Interagency Program Office MARCH 4, 2013 DISCLAIMER: The views and opinions expressed
How To Use Elasticsearch
Elasticsearch, Logstash, and Kibana (ELK) Dwight Beaver [email protected] Sean Hutchison [email protected] January 2015 2014 Carnegie Mellon University This material is based upon work funded and supported
COUNTERACTING PHISHING THROUGH HCI: DETECTING ATTACKS AND WARNING USERS
COUNTERACTING PHISHING THROUGH HCI: DETECTING ATTACKS AND WARNING USERS DISSERTATION an der Fakultat fur Mathematik, Informatik und Statistik der Ludwig-Maximilians-Universitat Munchen vorgelegt von Diplom-Medieninformatiker
eclips Design Packet Middle School and High School NASA Real World: Mathematics (Grades 6-8) NASA Launchpad (Grades 9-12) Educational Product
eclips Middle School and High School Design Packet Educational Product Educators & Students Grades 6-12 NP-2009-12-229-LaRC NASA Real World: Mathematics (Grades 6-8) NASA Launchpad (Grades 9-12) www.nasa.gov/education/nasaeclips
Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC
Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, [email protected] Technical POC: George Romas, [email protected]
Design methods for developing services
An introduction to service design and a selection of service design tools business challenge Design methods for developing services www.keepingconnected.co.uk About this document This is a brief introduction
SOCIAL MEDIA MEASUREMENT: IT'S NOT IMPOSSIBLE
SOCIAL MEDIA MEASUREMENT: IT'S NOT IMPOSSIBLE Chris Murdough A lot of excitement and optimism surround the potential of social media for marketers-after all, that is where attractive audience segments
TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES
TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES ii iii x xiv CHAPTER 1: INTRODUCTION 1 1.0 Background 1 1.1 Research Motivation 4 1.2 Research Objectives 5 1.3 Project Scope 6
Simplifying the audit through innovation. PwC Accounting Symposium August 7, 2015. PwC Audit Transformation 19
Simplifying the audit through innovation PwC Accounting Symposium August 7, 2015 PwC Audit Transformation 19 Simplifying the audit through innovation A closer look What s driving our transformation Globalization
Screen Design : Navigation, Windows, Controls, Text,
Overview Introduction Fundamentals of GUIs - methods - Some examples Screen : Navigation, Windows, Controls, Text, Evaluating GUI Performance 1 Fundamentals of GUI What kind of application? - Simple or
"A Role With No Edges": The Work Practices of Information Architects
Proceedings of HCI International 2003, vol 1, 22-27 June 2003, Crete, pp. 396-400. "A Role With No Edges": The Work Practices of Information Architects Toni Robertson, Cindy Hewlett, Sam Harvey and Jenny
Intro to Human Centered Service Design Thinking
Intro to Human Centered Service Design Thinking thinkjarcollective.com Adapted from ideo.org DESIGN A BETTER COMMUTE DISCOVER Human-centered design begins with in-depth interviews and qualitative research.
" ~l;~' 1uxr:~~\'<~ITY-lc FACUL TV GOVERNANCE ASSISTANT (Faculty Council approval on Consent Calendar) It/:;~. Iff~~~~~uV~
" ~l;~' 2014-2015 LONG SIGNATURE SHEET Proposal Number: S',]:'S -- 08-28-14 UNC CHARlDITE Proposal Title: New graduate course!tis ~~'ti~~'f1ser-centered Design and Evaluation Originating Department: Software
Research Brief. Using the Model. Category One: Strategy
The Sirius Directions in Services Model The Sirius Directions in Services Model groups sales, marketing and product service providers and agencies into five categories: strategy, reputation, demand, sales
BI Dashboards the Agile Way
BI Dashboards the Agile Way Paul DeSarra Paul DeSarra is Inergex practice director for business intelligence and data warehousing. He has 15 years of BI strategy, development, and management experience
ios Development: Getting Started Min Tsai March 1, 2011 terntek.com v1.0
ios Development: Getting Started Min Tsai March 1, 2011 terntek.com v1.0 1 Agenda Introduction Account, Software and Hardware Learn ios development App Design Discussion 2 Introduction Cover What is needed
Data Governance. Unlocking Value and Controlling Risk. Data Governance. www.mindyourprivacy.com
Data Governance Unlocking Value and Controlling Risk 1 White Paper Data Governance Table of contents Introduction... 3 Data Governance Program Goals in light of Privacy... 4 Data Governance Program Pillars...
IDC MaturityScape Benchmark: Big Data and Analytics in Government
IDC MaturityScape Benchmark: Big Data and Analytics in Government Adelaide O Brien Research Director, IDC [email protected] Presentation to ACT-IAC Emerging Technology SIG July, 2014 IDC MaturityScape Benchmark:
ECM: Key Market Trends and the Impact of Business Intelligence
ECM: Key Market Trends and the Impact of Business Intelligence Cheryl McKinnon, Principal Analyst February 2014 Agenda ECM current state and market trends Achieve ECM success by using business intelligence
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
Andrew Hill USER EXPERIENCE DESIGN PORTFOLIO
Andrew Hill USER EXPERIENCE DESIGN PORTFOLIO Projects Medical Device Call Center & Field Service Management Desktop & Mobile Apps (Siebel Open UI, ios) User Shadowing & Ethnographic Research Observation
MIS 3504 Digital Design and Innovation Studio
MIS 3504 Digital Design and Innovation Studio 1: INTRODUCTION Rich Flanagan / James Moustafellos/ Stephen Salvia Photo: Installation by Jenny Holzer, US Pavillion, Venice Biennale 1990 team formation 1
Info425, UW ischool 10/11/2007
Today s lecture Info 424 Channeling Few Projects Schedules & grades Intro to Perception Vis Critiques Projects & Grading Introduction to Perception Show Me the Numbers (ch 6) Sit near the front: some demos
WE DESIGN BETTER EXPERIENCES FOR YOUR CUSTOMERS
WE DESIGN BETTER EXPERIENCES FOR YOUR CUSTOMERS We are a UX and product design company helping growth-oriented organizations improve their customer experience. Let s see if we re a fit. We understand that
GENERIC AGENCY STATEMENT OF WORK. Website Redesign Project Generic Company
GENERIC AGENCY STATEMENT OF WORK Generic Company TABLE OF CONTENTS Our Envisioning Methodology... 3 Promote a Friendly Image to Prospective & Current Clients... 3 Enable Ease of Use... 3 Create a Design
Accent Technologies. UI / UX Designer
Accent Technologies UI / UX Designer Job Description 2015 UI Designer Location Melbourne, Florida (remote is negotiable) Required Education Bachelor s Degree or higher (plus) Employment Type Full-Time
Design Engineering 1 (a) General Guidelines _3 rd Semester
All students of 3 rd semester shall use the following guidelines for Design Engineering 1(a). Design Engineering is based on globally accepted Design Thinking methodology. Design thinking phases may be
Product Development: From Conception to Execution. Slide 1
Product Development: From Conception to Execution Slide 1 Product Development: From Conception to Execution Becky Lester, CPCU GAINWeb Product Owner Grange Insurance Damon Lay, ACAS, MAAA Director Business
CIO and Cyber Security Overview Argonne National Laboratory. Michael A. Skwarek CIO Matthew A. Kwiatkowski CISO Oct. 12, 2011
CIO and Cyber Security Overview Argonne National Laboratory Michael A. Skwarek CIO Matthew A. Kwiatkowski CISO Oct. 12, 2011 Argonne Cyber Security Overview The laboratory cyber security program is mature
User Experience (UX) Specialist Position Description
User Experience () Specialist Position Description February 9, 2015 User Experience () Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path...
Testing Websites with Users
3 Testing Websites with Users 3 TESTING WEBSITES WITH USERS Better Practice Checklist Practical guides for effective use of new technologies in Government www.agimo.gov.au/checklists version 3, 2004 Introduction
When User Experience Met Agile: A Case Study
When User Experience Met Agile: A Case Study Michael Budwig User Experience Manager PayPal 2211 North 1 st Street, San Jose, California 95131 USA [email protected] Soojin Jeong Manager, User Interface
Network VisualizationS
Network VisualizationS When do they make sense? Where to start? Clement Levallois, Assist. Prof. EMLYON Business School v. 1.1, January 2014 Bio notes Education in economics, management, history of science
Presented By: Leah R. Smith, PMP. Ju ly, 2 011
Presented By: Leah R. Smith, PMP Ju ly, 2 011 Business Intelligence is commonly defined as "the process of analyzing large amounts of corporate data, usually stored in large scale databases (such as a
