SlideShare a Scribd company logo
Improved Security Detection & Response via
Optimized Alert Output: A Usability Study
CapitolTechnology University
Dissertation Defense
by
G. Russell McRee
Dissertation Chair: Ian McAndrew PhD FRAeS
Dissertation Committee: Dr. Atta-Ur-Rahman (Examiner), Allen H. Exner (Ex Officio)
17 AUG 2021
Statement of the Problem
• Organizations risk data breach, loss of valuable human resources,
reputation, and revenue due to excessive security alert volume and a lack of
fidelity in security event data
• These organizations face a large burden due to alert overload, where 99% of
security professionals surveyed acknowledge that high volumes of security
alerts are problematic
Rationale for the Study
• This study addresses challenges inherent in data overload and complexity,
using security data analytics derived from machine learning (ML) and data
science models that produce alert output for analysts
• Security analysts benefit in two ways:
• Efficiency of results derived at scale via ML models
• Benefit of quality alert results derived from the same models.
Literature Overview
• Security data visualization can be used to address related human cognitive
limitations (Rajivan, 2011)
• Giacobe (2013) discussed the effectiveness of visual analytics and data
fusion techniques on situation awareness in cyber-security, and focused on
visual analytics, data fusion, and cybersecurity
• Giacobe found that participants using the visual analytics (VA) interface performed
better than those on the text-oriented interface, where the visual analytic interface
yielded a performance that was quicker and more accurate that the text interface.
• Giacobe conducted an experiment and survey separately
• This study merged quasi-experiment in survey
Research Methodology/Design
• Quantitative, quasi-experimental, explanatory study
• TechnologyAcceptance Model (TAM)
• Methodology utilized to statistically measure security analysts’ acceptance
of two security alert output types: visual alert output (VAO) & text alert
output (TAO)
• A qualitative methodology & design was not considered as the business
problem is one of data.The study’s data-driven findings can contribute to
data-informed business decisions.
Data Analysis
• DV: level of acceptance of the security alert output and is based on the four individual
TAM components: PU, PEU, AU, and IU
• Within-subjects IV: Scenario (3x), all participants subject to all scenarios
• Between-subjects IV: Maximum Visual
• Two levels: a preference forVAO in all three scenarios, and a preference forTAO in at least one
of the scenarios
• Mixed ANOVA to test level of acceptance of alert outputs as influenced by the within-
subjects variable Scenario and the between-subjects variable Maximum Visual
• Mann-Whitney U test performed to compare level of acceptance of alert outputs of
the two levels of MaximumVisual
• Friedman test performed to compare level of acceptance across the three scenarios
Findings (non-parametric)
Significant difference (U = 863.5, p = 0.023) in level
of acceptance of alert output between
respondents who selected visual output across all
scenarios (n = 59) compared to the respondents
who provided mixed responses (n = 22).
No significant difference between scenarios (𝑥^2
(2)=5.496, 𝑝< .064). Scenario mean ranks did not differ
significantly from scenario to scenario when not also
factoring for responses based on output preference
(MaximumVisual).
Findings – Mixed ANOVA
AllTAM measures (α = .05): a significant main effect of
MaximumVisual scores (F(1, 79) = 4.111, p = .046, ηp2 = .049)
on the level of acceptance of alert output as indicated by
sum of participants' scores for allTAM components (PU,
PEU, AU, and IU) between-subjects
Perceived Usability (α = .0125): a significant
main effect of MaximumVisual scores (F(1, 79)
= 7.643, p = .007, ηp2 = .088) on the level of
acceptance of alert output as indicated by sum
of participants' scores for Perceived Usability
(PU) between-subjects
Perceived Ease of Use (α = .0125): an insignificant main
effect of MaximumVisual scores (F(1, 79) = .842, p = .362,
ηp2 = .011) on the level of acceptance of alert output as
indicated by sum of participants' scores for Perceived Ease
of Use (PEU) between-subjects
Findings:
Mixed
ANOVA
Findings:
Mixed
ANOVA
AttitudeToward Using (α = .0125): an
insignificant main effect of MaximumVisual
scores (F(1, 79) = 4.566, p = .036, ηp2 = .055) on
the level of acceptance of alert output as
indicated by sum of participants' scores for
Attitude Toward Using (AU) between-subjects
Intention To Use (α = .0125): an insignificant main
effect of MaximumVisual scores (F(1, 79) = 4.378, p =
.040, ηp2 = .053) on the level of acceptance of alert
output as indicated by sum of participants' scores for
Intention to Use (IU) between-subjects
Findings – RQ1
• RQ1: Is there a difference in the level of acceptance of security alert output
between those with a preference for visual alert outputs (VAO) and those
with a preference for text alert outputs (TAO), withVAO andTAO
generated via data science/machine learning methods, as predicted by the
Technology Acceptance Model (TAM)? Yes.
• Non-parametric (between-subjects): U = 863.5, p = 0.023
• Parametric:
• Within-subjects: (F (1.455, 114.915) = 5.634, p = 0.010, ηp2 = .067)
• Between-subjects: (F (1, 79) = 4.111, p = .046, ηp2 = .049)
Findings – SQ1
• SQ1: Does the adoption ofVAO have a significant impact on the four
individualTAM components, perceived usefulness (PU), perceived ease of
use (PEU), attitude toward using (AU), and intention to use (IU)? In part.
• TheTAM components perceived usability (PU) and perceived ease of
use (PEU) are not significantly influenced by the adoption ofVAO
within-subjects while attitude toward using (AU), and intention to use
(IU) are significantly influenced by the adoption ofVAO within-subjects.
• TheTAM component perceived usability (PU) is significantly influenced
by the adoption ofVAO between-subjects.
Findings – SQ2
• SQ2: Does the adoption ofTAO have a significant impact on the four
individualTAM components, perceived usefulness (PU), perceived ease of
use (PEU), attitude toward using (AU), and intention to use (IU)? No.
• No individualTAM component is significantly influenced byTAO
adoption, andTAO adoption trailedVAO in near totality.
Recommendations for Research
• Security analysts likely seek an initial visual alert inclusive of the options to
dive deeper into the raw data. A future study could expose the degree to
which analysts seek multifaceted options
• A future study could further explore the perceptions of, and interactions
with, dynamic visualizations versus static visualizations
• Further explore, even under online survey constraints, a framework that
more robustly assesses user experience
• Opportunity exists to develop more nuanced data where information
specific to participant gender, location, age group, company or organization
size, and business sector could lead to improved insights
Thank you
Questions?
Once in a while, you get shown the light
In the strangest of places if you look at it right
~Garcia/Hunter

More Related Content

PDF
A Software Measurement Using Artificial Neural Network and Support Vector Mac...
PDF
Technology Assessment and Refinement for Its Adoption
PDF
A data envelopment analysis method for optimizing multi response problem with...
PDF
MLPA for health care presentation smc
PPTX
Total Survey Error across a program of three national surveys: using a risk m...
PPTX
Expectations and benefits of utilizing social media tools in new product deve...
PDF
Machine learning meets user analytics - Metageni tech talk
PDF
Opportunities for data analytics in power generation affelt 2016
A Software Measurement Using Artificial Neural Network and Support Vector Mac...
Technology Assessment and Refinement for Its Adoption
A data envelopment analysis method for optimizing multi response problem with...
MLPA for health care presentation smc
Total Survey Error across a program of three national surveys: using a risk m...
Expectations and benefits of utilizing social media tools in new product deve...
Machine learning meets user analytics - Metageni tech talk
Opportunities for data analytics in power generation affelt 2016

Similar to Improved Security Detection & Response via Optimized Alert Output: A Usability Study (20)

PDF
JOEUC04.pdf
PDF
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...
PDF
A TECHNOLOGY ACCEPTANCE MODEL FOR EMPIRICALLY TESTING NEW END-USER INFORMATIO...
PDF
RESEARCH 1-s2.0-S1532046409000963-main.pdf
PPT
TCC TAM applied to online education
PDF
SMUPI-BIS: a synthesis model for users’ perceived impact of business intelli...
PPT
Isecon.2006.sharp (1)
PDF
Mustafa Degerli - 2010 - What is available about technology acceptance of e-l...
PDF
Tam &amp; toe
PDF
A Self-Report Measure of End-User Security Attitudes (SA-6)
PDF
Improving Technological Services and Its Effect on the Police’s Performance
PDF
Essay On Reliability Of Visualization Tools
PDF
Venkatesh2003
PDF
A Study of Technology Acceptance Model (TAM) In Understanding the Efficacy of...
PPTX
LITERATURE-MODEL.pptxddddddddddddddddddddddddddddddddd
PDF
ASSESSING THE ADOPTION OF E-GOVERNMENT USING TAM MODEL: CASE OF EGYPT
PDF
Assessing the adoption of e government using tam model case of egypt
PDF
ASSESSING THE ADOPTION OF E-GOVERNMENT USING TAM MODEL: CASE OF EGYPT
PDF
The Technology Acceptance Model (TAM) as a
PPTX
Hcc lesson6
JOEUC04.pdf
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...
A TECHNOLOGY ACCEPTANCE MODEL FOR EMPIRICALLY TESTING NEW END-USER INFORMATIO...
RESEARCH 1-s2.0-S1532046409000963-main.pdf
TCC TAM applied to online education
SMUPI-BIS: a synthesis model for users’ perceived impact of business intelli...
Isecon.2006.sharp (1)
Mustafa Degerli - 2010 - What is available about technology acceptance of e-l...
Tam &amp; toe
A Self-Report Measure of End-User Security Attitudes (SA-6)
Improving Technological Services and Its Effect on the Police’s Performance
Essay On Reliability Of Visualization Tools
Venkatesh2003
A Study of Technology Acceptance Model (TAM) In Understanding the Efficacy of...
LITERATURE-MODEL.pptxddddddddddddddddddddddddddddddddd
ASSESSING THE ADOPTION OF E-GOVERNMENT USING TAM MODEL: CASE OF EGYPT
Assessing the adoption of e government using tam model case of egypt
ASSESSING THE ADOPTION OF E-GOVERNMENT USING TAM MODEL: CASE OF EGYPT
The Technology Acceptance Model (TAM) as a
Hcc lesson6
Ad

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
A Presentation on Touch Screen Technology
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
1. Introduction to Computer Programming.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Mushroom cultivation and it's methods.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Getting Started with Data Integration: FME Form 101
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cloud_computing_Infrastucture_as_cloud_p
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Touch Screen Technology
Hindi spoken digit analysis for native and non-native speakers
1. Introduction to Computer Programming.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Mushroom cultivation and it's methods.pdf
WOOl fibre morphology and structure.pdf for textiles
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Tartificialntelligence_presentation.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Ad

Improved Security Detection & Response via Optimized Alert Output: A Usability Study

  • 1. Improved Security Detection & Response via Optimized Alert Output: A Usability Study CapitolTechnology University Dissertation Defense by G. Russell McRee Dissertation Chair: Ian McAndrew PhD FRAeS Dissertation Committee: Dr. Atta-Ur-Rahman (Examiner), Allen H. Exner (Ex Officio) 17 AUG 2021
  • 2. Statement of the Problem • Organizations risk data breach, loss of valuable human resources, reputation, and revenue due to excessive security alert volume and a lack of fidelity in security event data • These organizations face a large burden due to alert overload, where 99% of security professionals surveyed acknowledge that high volumes of security alerts are problematic
  • 3. Rationale for the Study • This study addresses challenges inherent in data overload and complexity, using security data analytics derived from machine learning (ML) and data science models that produce alert output for analysts • Security analysts benefit in two ways: • Efficiency of results derived at scale via ML models • Benefit of quality alert results derived from the same models.
  • 4. Literature Overview • Security data visualization can be used to address related human cognitive limitations (Rajivan, 2011) • Giacobe (2013) discussed the effectiveness of visual analytics and data fusion techniques on situation awareness in cyber-security, and focused on visual analytics, data fusion, and cybersecurity • Giacobe found that participants using the visual analytics (VA) interface performed better than those on the text-oriented interface, where the visual analytic interface yielded a performance that was quicker and more accurate that the text interface. • Giacobe conducted an experiment and survey separately • This study merged quasi-experiment in survey
  • 5. Research Methodology/Design • Quantitative, quasi-experimental, explanatory study • TechnologyAcceptance Model (TAM) • Methodology utilized to statistically measure security analysts’ acceptance of two security alert output types: visual alert output (VAO) & text alert output (TAO) • A qualitative methodology & design was not considered as the business problem is one of data.The study’s data-driven findings can contribute to data-informed business decisions.
  • 6. Data Analysis • DV: level of acceptance of the security alert output and is based on the four individual TAM components: PU, PEU, AU, and IU • Within-subjects IV: Scenario (3x), all participants subject to all scenarios • Between-subjects IV: Maximum Visual • Two levels: a preference forVAO in all three scenarios, and a preference forTAO in at least one of the scenarios • Mixed ANOVA to test level of acceptance of alert outputs as influenced by the within- subjects variable Scenario and the between-subjects variable Maximum Visual • Mann-Whitney U test performed to compare level of acceptance of alert outputs of the two levels of MaximumVisual • Friedman test performed to compare level of acceptance across the three scenarios
  • 7. Findings (non-parametric) Significant difference (U = 863.5, p = 0.023) in level of acceptance of alert output between respondents who selected visual output across all scenarios (n = 59) compared to the respondents who provided mixed responses (n = 22). No significant difference between scenarios (𝑥^2 (2)=5.496, 𝑝< .064). Scenario mean ranks did not differ significantly from scenario to scenario when not also factoring for responses based on output preference (MaximumVisual).
  • 8. Findings – Mixed ANOVA AllTAM measures (α = .05): a significant main effect of MaximumVisual scores (F(1, 79) = 4.111, p = .046, ηp2 = .049) on the level of acceptance of alert output as indicated by sum of participants' scores for allTAM components (PU, PEU, AU, and IU) between-subjects
  • 9. Perceived Usability (α = .0125): a significant main effect of MaximumVisual scores (F(1, 79) = 7.643, p = .007, ηp2 = .088) on the level of acceptance of alert output as indicated by sum of participants' scores for Perceived Usability (PU) between-subjects Perceived Ease of Use (α = .0125): an insignificant main effect of MaximumVisual scores (F(1, 79) = .842, p = .362, ηp2 = .011) on the level of acceptance of alert output as indicated by sum of participants' scores for Perceived Ease of Use (PEU) between-subjects Findings: Mixed ANOVA
  • 10. Findings: Mixed ANOVA AttitudeToward Using (α = .0125): an insignificant main effect of MaximumVisual scores (F(1, 79) = 4.566, p = .036, ηp2 = .055) on the level of acceptance of alert output as indicated by sum of participants' scores for Attitude Toward Using (AU) between-subjects Intention To Use (α = .0125): an insignificant main effect of MaximumVisual scores (F(1, 79) = 4.378, p = .040, ηp2 = .053) on the level of acceptance of alert output as indicated by sum of participants' scores for Intention to Use (IU) between-subjects
  • 11. Findings – RQ1 • RQ1: Is there a difference in the level of acceptance of security alert output between those with a preference for visual alert outputs (VAO) and those with a preference for text alert outputs (TAO), withVAO andTAO generated via data science/machine learning methods, as predicted by the Technology Acceptance Model (TAM)? Yes. • Non-parametric (between-subjects): U = 863.5, p = 0.023 • Parametric: • Within-subjects: (F (1.455, 114.915) = 5.634, p = 0.010, ηp2 = .067) • Between-subjects: (F (1, 79) = 4.111, p = .046, ηp2 = .049)
  • 12. Findings – SQ1 • SQ1: Does the adoption ofVAO have a significant impact on the four individualTAM components, perceived usefulness (PU), perceived ease of use (PEU), attitude toward using (AU), and intention to use (IU)? In part. • TheTAM components perceived usability (PU) and perceived ease of use (PEU) are not significantly influenced by the adoption ofVAO within-subjects while attitude toward using (AU), and intention to use (IU) are significantly influenced by the adoption ofVAO within-subjects. • TheTAM component perceived usability (PU) is significantly influenced by the adoption ofVAO between-subjects.
  • 13. Findings – SQ2 • SQ2: Does the adoption ofTAO have a significant impact on the four individualTAM components, perceived usefulness (PU), perceived ease of use (PEU), attitude toward using (AU), and intention to use (IU)? No. • No individualTAM component is significantly influenced byTAO adoption, andTAO adoption trailedVAO in near totality.
  • 14. Recommendations for Research • Security analysts likely seek an initial visual alert inclusive of the options to dive deeper into the raw data. A future study could expose the degree to which analysts seek multifaceted options • A future study could further explore the perceptions of, and interactions with, dynamic visualizations versus static visualizations • Further explore, even under online survey constraints, a framework that more robustly assesses user experience • Opportunity exists to develop more nuanced data where information specific to participant gender, location, age group, company or organization size, and business sector could lead to improved insights
  • 15. Thank you Questions? Once in a while, you get shown the light In the strangest of places if you look at it right ~Garcia/Hunter