LERSSE-POSTER-2009-010

Towards Developing Usability Heuristics for Evaluation of IT Security Management (ITSM) Tools

Pooya Jaferian ; David Botta ; Kirstie Hawkey ; Konstantin Beznosov

08 November 2009

Abstract: Evaluating the usability of specific information technology (IT) security tools is challenging. For example, laboratory experiments can have little validity due to the complexity of real-world security problems and the need to situate a specific tool within a larger context. However, it is difficult to recruit IT security practitioners for simple interviews, let alone field observations. Direct observation of tool use can be time consuming as much security work is spontaneous (e.g. security incident response) or occurs over many months (e.g., deploying an identity management system). As ITSM tool use is intrinsically cooperative, its study inherits the difficulties of studying cooperation. As a result, heuristic evaluation of ITSM tools could be a viable component of tool usability evaluations.

Keyword(s): HOT Admin ; IdM ; ISSNET ; Usable Security

Published in: Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov, Towards Developing Usability Heuristics for Evaluation of IT Security Management (ITSM) Tools. Poster at CHIMIT 2009, Baltimore, MD, 2009.:

The record appears in these collections:
Usable Security
Posters

 Record created 2009-11-19, last modified 2013-05-22


Transfer from CDS 0.99.7:
Download fulltext
PDF

Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)