Abstract
As the first part of a Analyze-Visualize-Validate cycle, we have initiated a domain analysis of email computer forensics to determine where visualization may be beneficial. To this end, we worked with police detectives and other forensics professionals. However, the process of designing and executing such a study with real-world experts has been a non-trivial task. This paper presents our efforts in this area and the lessons learned as guidance for other practitioners.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Householder, A., Houle, K., Dougherty, C.: Computer attack trends challenge internet security. IEEE Computer 35(4), 5–7 (2002)
Noblett, M., Pollit, M., Presley, L.: Recovering and examining computer forensic evidence. Forensic Science Communications 2(4) (2000)
Wolfe, H.: Computer forensics. Computers and Security 22(1), 26–28 (2003)
Bequai, A.: Syndicated crime and international terrorism. Computers and Security 21(4), 333–337 (2002)
Kessler, G., Schirling, M.: Computer forensics: Cracking the books, cracking the case. Information Security, 68–81 (2002)
Thompson, R.: Chasing after ’petty’ computer crime. IEEE Potentials 18(1), 20–22 (1999)
Teelink, S., Erbacher, R.F.: Improving the computer forensic analysis process through visualization. Communications of the ACM 49(2), 71–75 (2006)
Host, M., Runeson, P.: Checklists for sofware engineering case study research. In: International Symposium on Empirical Software Engineering and Measurement, pp. 479–481 (2007)
Kosara, R., Healey, C.G., Interrante, V., Laidlaw, D.H., Ware, C.: User studies: Why, how, and when? IEEE Computer Graphics and Applications 23(4), 20–25 (2003)
AccessData: (Forensic toolkit 2.0) (Last checked May 2008), http://www.accessdata.com/Products/ftk2test.aspx
Carrier, B.: (Autopsy forensic browser) (Last checked May 2008), http://www.sleuthkit.org/autopsy/
Carrier, B.: Computer Forensics Basics. In: Know Your Enemy, ch. 11, 2nd edn., Addison Wesley, Reading (2004)
Singer, J., Lethbridge, T.: Methods for studying maintenance activities. In: Proceedings of the Workshop for Empirical Studies of Software Maintenance, pp. 105–110 (1996)
VanSomeren, M.W., Bernard, Y.F., Sandberg, J.A.C.: The Think Aloud Method: A Practical Guide to Modeling Cognitive Processes. Academic Press, London (1994)
Hackos, J.T., Redish, J.C.: User and Task Analysis for Interface Design. John Wiley & Sons, Inc., New York (1998)
Hix, D., Hartson, H.R.: Developing User Interfaces: Ensuring Usability through Product & Process. John Wiley & Sons, Inc., New York (1993)
Mayhew, D.: The Usability Engineering Lifecycle: a Practitioner’s Handbook for User Interface Design. Morgan Kaufmann Publishers, San Francisco (1999)
Sjoberg, D.I.K., Anda, B., Arishold, E., Dyba, T., Jorgensen, M., Karahasanovic, A., Koren, E.F., Vokac, M.: Conducting realistic experiments in software engineering. In: First International Symposium on Empirical Software Engineering, pp. 17–26 (2002)
Stoll, J., McColgin, D., Gregory, M., Crow, V., Edwards, W.K.: Exploiting the user: Adapting personas for use in security visualization design. In: Proceedings of the Fourth Workshop on Visualization for Computer Security (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jankun-Kelly, T.J., Franck, J., Wilson, D., Carver, J., Dampier, D., Swan, J.E. (2008). Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization. In: Goodall, J.R., Conti, G., Ma, KL. (eds) Visualization for Computer Security. VizSec 2008. Lecture Notes in Computer Science, vol 5210. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85933-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-85933-8_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85931-4
Online ISBN: 978-3-540-85933-8
eBook Packages: Computer ScienceComputer Science (R0)