000000164 001__ 164
000000164 005__ 20130522141942.0
000000164 037__ $$aLERSSE-RefConfPaper-2008-030
000000164 041__ $$aeng
000000164 100__ $$aPooya Jaferian
000000164 100__ $$aDavid Botta
000000164 100__ $$aFahimeh Raja
000000164 100__ $$aKirstie Hawkey
000000164 100__ $$aKonstantin Beznosov
000000164 245__ $$aGuidelines for Designing IT Security Management Tools
000000164 260__ $$c2008-09-09
000000164 300__ $$a10p
000000164 520__ $$aAn important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of design guidelines for such tools. We gathered guidelines and recommendations related to IT security management tools from the literature as well as from our own prior studies of IT security management. We categorized and combined these into a set of high level guidelines and identified the relationships between the guidelines and challenges in IT security management. We also illustrated the need for the guidelines, where possible, with quotes from additional interviews with five security practitioners. Our framework of guidelines can be used by those developing IT security tools, as well as by practitioners and managers evaluating tools.
000000164 6531_ $$aHuman Factors;Security Management;Design;Usable Security; HOT Admin
000000164 6531_ $$aissnet
000000164 8560_ $$fpooya@ece.ubc.ca
000000164 8564_ $$uhttp://lersse-dl.ece.ubc.ca/record/164/files/164.pdf$$yTransfer from CDS 0.99.7
000000164 909C4 $$pPooya Jaferian, David Botta, Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov, "Guidelines for Designing IT Security Management Tools," In CHIMIT '08: Proceedings of the 2008 symposium on Computer Human Interaction for the Management of Information Technology, San Diego, CA, USA, 7:1-7:10, ACM.
000000164 980__ $$aRefConfPaper