000000202 001__ 202
000000202 005__ 20130522141949.0
000000202 037__ $$aLERSSE-PRESENTATION-2009-077
000000202 041__ $$aeng
000000202 100__ $$aPooya Jaferian
000000202 245__ $$aUser Centered Design of ITSM Tools
000000202 260__ $$c2009-06-17
000000202 300__ $$amult. p
000000202 520__ $$aIT Security Management (ITSM) requires collaboration between diverse stakeholders, has an environment of numerous technological and business specializations (is complex), has many issues that need to be handled with discretion, is fast paced, uncertain, requires reliance of practitioners on tacit knowledge, and there is lack of immediate feedback when imposing a change on the system. Direct observation of tool use can be time consuming as much security work is spontaneous (e.g. security incident response) or occurs over many months. As ITSM tool use is intrinsically cooperative, its study inherits the difficulties of studying cooperation. As a result, we argue that discount usability evaluation of ITSM tools could be a viable component of user centered design of ITSM tools. We address the lack of discount usability evaluation methods for ITSM tools by developing guidelines and heuristics for evaluation of ITSM tools.
000000202 6531_ $$aSecurity Tools
000000202 6531_ $$aUsable Security
000000202 6531_ $$aSecurity Practitioners
000000202 6531_ $$aCollaboration
000000202 6531_ $$aCase Study
000000202 6531_ $$aIdM
000000202 6531_ $$aHeuristic Evaluation
000000202 6531_ $$aissnet
000000202 8560_ $$fpooya@ece.ubc.ca
000000202 8564_ $$uhttp://lersse-dl.ece.ubc.ca/record/202/files/202.pdf$$yTransfer from CDS 0.99.7
000000202 909C4 $$pTalk given at NSERC ISSNet Workshop 2009, Carleton University, Ottawa, Canada.
000000202 980__ $$aPRESENTATION