TY - GEN
T1 - Visualization is better! A comparative evaluation
AU - Goodall, John R.
PY - 2009
Y1 - 2009
N2 - User testing is an integral component of user-centered design, but has only rarely been applied to visualization for cyber security applications. This paper describes a comparative evaluation of a visualization application and a traditional interface for analyzing network packet captures, that was conducted as part of the usercentered design process. Structured, well-defined tasks and exploratory, open-ended tasks were completed with both tools. Accuracy and efficiency were measured for the well-defined tasks, number of insights was measured for exploratory tasks and user perceptions were recorded for each tool. The results of this evaluation demonstrated that users performed significantly more accurately in the well-defined tasks, discovered a higher number of insights and demonstrated a clear preference for the visualization tool. The study presented here may be useful for future visualization for network security visualization evaluation designers. Some of the challenges and lessons learned are described.
AB - User testing is an integral component of user-centered design, but has only rarely been applied to visualization for cyber security applications. This paper describes a comparative evaluation of a visualization application and a traditional interface for analyzing network packet captures, that was conducted as part of the usercentered design process. Structured, well-defined tasks and exploratory, open-ended tasks were completed with both tools. Accuracy and efficiency were measured for the well-defined tasks, number of insights was measured for exploratory tasks and user perceptions were recorded for each tool. The results of this evaluation demonstrated that users performed significantly more accurately in the well-defined tasks, discovered a higher number of insights and demonstrated a clear preference for the visualization tool. The study presented here may be useful for future visualization for network security visualization evaluation designers. Some of the challenges and lessons learned are described.
KW - Comparative evaluation
KW - Security visualization
KW - User testing
KW - User-centered design
UR - https://www.scopus.com/pages/publications/77949384586
U2 - 10.1109/VIZSEC.2009.5375543
DO - 10.1109/VIZSEC.2009.5375543
M3 - Conference contribution
AN - SCOPUS:77949384586
SN - 9781424454136
T3 - 6th International Workshop on Visualization for Cyber Security 2009, VizSec 2009 - Proceedings
SP - 57
EP - 68
BT - 6th International Workshop on Visualization for Cyber Security 2009, VizSec 2009 - Proceedings
T2 - 6th International Workshop on Visualization for Cyber Security 2009, VizSec 2009
Y2 - 11 October 2009 through 11 October 2009
ER -