{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:24:22Z","timestamp":1725654262806},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856726","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"340-345","source":"Crossref","is-referenced-by-count":5,"title":["EEVi - framework for evaluating the effectiveness of visualization in cyber-security"],"prefix":"10.1109","author":[{"given":"Aneesha","family":"Sethi","sequence":"first","affiliation":[]},{"given":"Federica","family":"Paci","sequence":"additional","affiliation":[]},{"given":"Gary","family":"Wills","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"19","author":"d'amico","year":"2008","journal-title":"The Real Work of Computer Network Defense Analysts"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1177\/154193120504900304"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1057\/ivs.2010.5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2009.5375542"},{"key":"ref14","article-title":"Security professionals stymied by outdated visualization tools","author":"king","year":"0","journal-title":"The Wall Street Journal April 2015"},{"key":"ref15","article-title":"Seven Guiding Scenarios for Information Visualization Evaluation","author":"lam","year":"0","journal-title":"Research Report 2011-992-04 2011 Superseded by and improved in a follow-up journal article"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312771"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.231"},{"journal-title":"NVivo qualitative data analysis Software QSR International Pty Ltd Version 11","year":"2015","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016910"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312763"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312764"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"ref5","first-page":"33","article-title":"7 key challenges for visualization in cyber network defense","author":"best","year":"2014","journal-title":"Proc Workshop Vol Visualization"},{"key":"ref8","article-title":"Working Minds: A Practitioner's Guide to Cognitive Task Analysis","author":"crandall","year":"2006","journal-title":"A Bradford Book Bradford Book"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029231"},{"key":"ref2","first-page":"459","article-title":"Uncovering project screening heuristics with cognitive task analysis: How do gatekeepers decide which technologies to promote?","author":"albar","year":"2013","journal-title":"2013 Proceedings of PICMET '13 Technology Management in the IT-Driven Services (PICMET) PICMET"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(15)30066-X"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6698979"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2671491.2671492"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2671491.2671499","article-title":"Davast: Data-centric system level activity visualization","author":"w\u00fcchner","year":"2014","journal-title":"Proceedings of the Eleventh Workshop on Visualization for Cyber Security VizSec'14"},{"key":"ref21","first-page":"141","article-title":"The theory of cognitive fit: One aspect of a general theory of problem-solving","author":"vessey","year":"2015","journal-title":"Human-Computer Interaction and Management Information Systems Foundations"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856726.pdf?arnumber=7856726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,24]],"date-time":"2022-07-24T09:19:12Z","timestamp":1658654352000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856726\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856726","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}