Abstract
In modern means of mobile Internet security, including those based on touch screens, various visualization models are used. However, with the increasing complexity of these models, the requirements for models of user interaction with visualization change, the need for their adaptability increases. The article proposes an adaptive approach to the formation of a user interface based on touch screens for managing mobile Internet security. The results of experiments on user interaction with visualization of a centralized and decentralized network of devices and user perception of certain gestures when using touch screens are also shown. The problems and advantages of this type of interface, identified during the tests are described.
Supported by the grant of RFBR 18-07-01488-a in SPIIRAS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Apple | use multi-touch gestures on your Mac - Apple support. https://support.apple.com/en-us/HT204895. Accessed June 2019
Apple developer | gestures - user interaction - IOS - human interface guidelines. https://developer.apple.com/design/human-interface-guidelines/ios/user-interaction/gestures/. Accessed June 2019
Apple developer | UI design dos and donts. https://developer.apple.com/design/tips/. Accessed June 2019
kolenda, N.: Psychology and business. https://www.nickkolenda.com/user-experience/#. Accessed June 2019
World Usability Congress: Touch screen usability best practices when designing automation user interfaces (UI). https://worldusabilitycongress.com/touch-screen-usability-best-practices-when-designing-automation-user-interfaces-ui/. Accessed June 2019
Ananto, B.S., Sari, R.F., Harwahyu, R.: Color transformation for color blind compensation on augmented reality system. In: 2011 International Conference on User Science and Engineering (i-USEr), pp. 129–134. IEEE (2011)
Best, D.M., Bohn, S., Love, D., Wynne, A., Pike, W.A.: Real-time visualization of network behaviors for situational awareness. In: Proceedings of the 7th International Symposium on Visualization for Cyber Security, pp. 79–90. ACM (2010)
Bishop, M.: Conspiracy and information flow in the take-grant protection model. J. Comput. Secur. 4(4), 331–359 (1996)
Choi, H., Lee, H., Kim, H.: Fast detection and visualization of network attacks on parallel coordinates. Comput. Secur. 28(5), 276–288 (2009)
Desnitsky, V., Levshun, D., Chechulin, A., Kotenko, I.V.: Design technique for secure embedded devices: application for creation of integrated cyber-physical security system. JoWUA 7(2), 60–80 (2016)
Heitzmann, A., Palazzi, B., Papamanthou, C., Tamassia, R.: Effective visualization of file system access-control. In: Goodall, J.R., Conti, G., Ma, K.-L. (eds.) VizSec 2008. LNCS, vol. 5210, pp. 18–25. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85933-8_2
Hutchins, E.L., Hollan, J.D., Norman, D.A.: Direct manipulation interfaces. Hum. Comput. Interact. 1(4), 311–338 (1985)
Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: 2006 22nd Annual Computer Security Applications Conference, ACSAC 2006, pp. 121–130. IEEE (2006)
Kim, D.-K., Ray, I., France, R., Li, N.: Modeling role-based access control using parameterized UML models. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004. LNCS, vol. 2984, pp. 180–193. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24721-0_13
Kolomeec, M., Chechulin, A., Kotenko, I.V.: Methodological primitives for phased construction of data visualization models. J. Internet Serv. Inf. Secur. 5(4), 60–84 (2015)
Kolomeec, M., Chechulin, A., Pronoza, A., Kotenko, I.V.: Technique of data visualization: example of network topology display for security monitoring. JoWUA 7(1), 58–78 (2016)
Kolomeec, M., et al.: Choosing models for security metrics visualization. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-ACNS 2017. LNCS, vol. 10446, pp. 75–87. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65127-9_7
Kolomeets, M., Chechulin, A., Kotenko, I., Saenko, I.: Access control visualization using triangular matrices. In: 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 348–355. IEEE (2019)
Kolomeets, M., Chechulin, A., Kotenko, I., Strecker, M.: Voronoi maps for planar sensor networks visualization. In: You, I., Chen, H.-C., Sharma, V., Kotenko, I. (eds.) MobiSec 2017. CCIS, vol. 971, pp. 96–109. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-3732-1_7
Kotenko, I., Doynikova, E.: Security assessment of computer networks based on attack graphs and security events. In: Linawati, M.M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) ICT-EurAsia 2014. LNCS, vol. 8407. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55032-4_47
Kotenko, I., Stepashkin, M., Doynikova, E.: Security analysis of information systems taking into account social engineering attacks. In: 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing, pp. 611–618. IEEE (2011)
Kotenko, I., Ulanov, A.: Simulation of internet DDoS attacks and defense. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 327–342. Springer, Heidelberg (2006). https://doi.org/10.1007/11836810_24
Roberts, J.C.: Guest editor’s introduction: special issue on coordinated and multiple views in exploratory visualization. Inf. Vis. 2(4), 199–200 (2003)
Sarkar, M., Brown, M.H.: Graphical fisheye views. Commun. ACM 37(12), 73–83 (1994)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhernova, K., Kolomeets, M., Kotenko, I., Chechulin, A. (2020). Adaptive Touch Interface: Application for Mobile Internet Security. In: You, I., Chen, HC., Leu, FY., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2019. Communications in Computer and Information Science, vol 1121. Springer, Singapore. https://doi.org/10.1007/978-981-15-9609-4_5
Download citation
DOI: https://doi.org/10.1007/978-981-15-9609-4_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9608-7
Online ISBN: 978-981-15-9609-4
eBook Packages: Computer ScienceComputer Science (R0)