skip to main content
10.1145/2559206.2581338acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
poster

Exploring the need for visualizations in system administration tools

Published:26 April 2014Publication History

ABSTRACT

Visualization is an effective way to explore and understand abstract data. While many tool domains have benefitted from the use of visualizations, they currently are in limited use in system administrator tools. The long-term objective of this research is to ease the work of sys admins through enhanced visualizations. Before we can design such tools, we must better understand the work of sys admins, their current tool environment, and how interactive visualizations and system models might enhance their routines. This paper presents our two-phase requirements gathering study currently underway.

Skip Supplemental Material Section

Supplemental Material

References

  1. ROB BARRETT, ESER KANDOGAN, PAUL P. MAGLIO, EBEN M. HABER, LEILA A. TAKAYAMA, AND MADHU PRABAKER. 2004. Field studies of computer system administrators: analysis of system management tools and practices. In CSCW '04, 388--395. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. DANIEL M. BEST, SHAWN BOHN, DOUGLAS LOVE, ADAM WYNNE, AND WILLIAM A. PIKE. 2010. Real-time visualization of network behaviors for situational awareness. In VizSec '10. 79--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. ANDRE GAGNÉ, KASIA MULDNER, AND KONSTANTIN BEZNOSOV. Identifying differences between security and other IT professionals: a qualitative analysis. In HAISA '08, 69--80.Google ScholarGoogle Scholar
  4. EBEN M. HABER AND JOHN BAILEY. 2007. Design guidelines for system administration tools developed through ethnographic field studies. In CHIMIT '07, Article 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. EBEN M. HABER, ESER KANDOGAN, AND PAUL MAGLIO. Collaboration in System Administration. Queue8, 12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. POOYA JAFERIAN, DAVID BOTTA, FAHIMEH RAJA, KIRSTIE HAWKEY, AND KONSTANTIN BEZNOSOV. 2008. Guidelines for designing IT security management tools. In CHiMiT '08. Article 7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. PETER MCLACHLAN, TAMARA MUNZNER, ELEFTHERIOS KOUTSOFIOS, AND STEPHEN NORTH. 2008. LiveRAC: interactive visual exploration of system management time-series data. In CHI '08. 1483--1492. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. SHIRAVI, H., SHIRAVI, A., & GHORBANI, A. A. 2012. A survey of visualization systems for network security. IEEE Transactions on Visualization and Computer Graphics, 18(8), 1313--1329. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. TERYL TAYLOR, DIANA PATERSON, JOEL GLANFIELD, CARRIE GATES, STEPHEN BROOKS, AND JOHN MCHUGH. 2009. FloVis: Flow Visualization System. In CATCH '09, 186--198. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. RAMONA SU THOMPSON, ESA M. RANTANEN, WILLIAM YURCIK, AND BRIAN P. BAILEY. 2007. Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection. CHI '07, 1205--1214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. LEILA TAKAYAMA AND ESER KANDOGAN. 2006. Trust as an underlying factor of system administrator interface choice. In CHI EA '06, 1391--1396. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. NICOLE F. VELASQUEZ, SUZANNE WEISBAND, AND ALEXANDRA DURCIKOVA. 2008. Designing tools for system administrators: an empirical test of the integrated user satisfaction model. In LISA'08, 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. RODRIGO WERLINGER, KIRSTIE HAWKEY, AND KONSTANTIN BEZNOSOV. 2009. An integrated view of human, organizational, and technological challenges of IT security management. Inf. Manag. Comput. Security. 2009, 4--19.Google ScholarGoogle Scholar

Index Terms

  1. Exploring the need for visualizations in system administration tools

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI EA '14: CHI '14 Extended Abstracts on Human Factors in Computing Systems
      April 2014
      2620 pages
      ISBN:9781450324748
      DOI:10.1145/2559206

      Copyright © 2014 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 April 2014

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      CHI EA '14 Paper Acceptance Rate1,000of3,200submissions,31%Overall Acceptance Rate6,164of23,696submissions,26%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader