000000221 001__ 221
000000221 005__ 20130522141957.0
000000221 037__ $$aLERSSE-POSTER-2009-010
000000221 100__ $$aPooya Jaferian
000000221 245__ $$aTowards Developing Usability Heuristics for Evaluation of IT Security Management (ITSM) Tools
000000221 260__ $$c2009-11-08
000000221 300__ $$a1
000000221 520__ $$aEvaluating the usability of specific information technology (IT) security tools is challenging. For example, laboratory experiments can have little validity due to the complexity of real-world security problems and the need to situate a specific tool within a larger context. However, it is difficult to recruit IT security practitioners for simple interviews, let alone field observations. Direct observation of tool use can be time consuming as much security work is spontaneous (e.g. security incident response) or occurs over many months (e.g., deploying an identity management system). As ITSM tool use is intrinsically cooperative, its study inherits the difficulties of studying cooperation. As a result, heuristic evaluation of ITSM tools could be a viable component of tool usability evaluations.
000000221 6531_ $$aHOT Admin
000000221 6531_ $$aIdM
000000221 6531_ $$aISSNET
000000221 6531_ $$aUsable Security
000000221 700__ $$aDavid Botta
000000221 700__ $$aKirstie Hawkey
000000221 700__ $$aKonstantin Beznosov
000000221 8560_ $$fpooya@ece.ubc.ca
000000221 8564_ $$uhttp://lersse-dl.ece.ubc.ca/record/221/files/221.pdf$$yTransfer from CDS 0.99.7
000000221 909C4 $$pPooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov, Towards Developing Usability Heuristics for Evaluation of IT Security Management (ITSM) Tools. Poster at CHIMIT 2009, Baltimore, MD, 2009.
000000221 980__ $$aPOSTER