CHI '11 Extended Abstracts on Human Factors in Computing Systems 2011
DOI: 10.1145/1979742.1979820
|View full text |Cite
|
Sign up to set email alerts
|

Heuristics for evaluating IT security management tools

Abstract: The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, standard usability heuristics are hard to apply as IT security management occurs within a complex and collaborative context that involves diverse stakeholders. We propose a set of ITSM usability heuristics that are based on activity theory, are supported by prior research, and consider the complex and cooperative nature of security management. In a between-subjects study… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
23
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(24 citation statements)
references
References 6 publications
1
23
0
Order By: Relevance
“…In 20 of the 21 cases, the authors conclude that the domain heuristics developed (or refined) are more efficient than then control heuristics. The case wherein this does not occur is in the domain of security management applications [19]; in this case only Φ P = 1.03 could be calculated, which is difficult to interpret without additional information. Table II, breaking each sub-case down as an independent input in the graph.…”
Section: A Questionnaire For Investigators That Used R3cmentioning
confidence: 99%
“…In 20 of the 21 cases, the authors conclude that the domain heuristics developed (or refined) are more efficient than then control heuristics. The case wherein this does not occur is in the domain of security management applications [19]; in this case only Φ P = 1.03 could be calculated, which is difficult to interpret without additional information. Table II, breaking each sub-case down as an independent input in the graph.…”
Section: A Questionnaire For Investigators That Used R3cmentioning
confidence: 99%
“…Jaferian et al [67] point out that more complex systems may require a larger base of evaluators. In their heuristic evaluation of security management tools, between eight and ten evaluators found 75% of the usability problems, collectively.…”
Section: Heuristic Evaluationmentioning
confidence: 99%
“…Power [113] used such an approach to categorize more than 900 usability problems obtained from a heuristic evaluation. Similarly, Jaferian et al [67] categorize 164 guidelines for building IT security management tools. Preston et al [118] specifically employ thematic analysis for their pedestrian navigation data analysis.…”
Section: Thematic Analysismentioning
confidence: 99%
See 2 more Smart Citations