Towards Developing Usability Heuristics for Evaluation of IT Security Management (ITSM) Tools
Pooya Jaferian ; David Botta ; Kirstie Hawkey ; Konstantin Beznosov
08 November 2009
Abstract: Evaluating the usability of specific information technology (IT) security tools is challenging. For example, laboratory experiments can have little validity due to the complexity of real-world security problems and the need to situate a specific tool within a larger context. However, it is difficult to recruit IT security practitioners for simple interviews, let alone field observations. Direct observation of tool use can be time consuming as much security work is spontaneous (e.g. security incident response) or occurs over many months (e.g., deploying an identity management system). As ITSM tool use is intrinsically cooperative, its study inherits the difficulties of studying cooperation. As a result, heuristic evaluation of ITSM tools could be a viable component of tool usability evaluations.
Keyword(s): HOT Admin ; IdM ; ISSNET ; Usable Security
Published in: Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov, Towards Developing Usability Heuristics for Evaluation of IT Security Management (ITSM) Tools. Poster at CHIMIT 2009, Baltimore, MD, 2009.:
The record appears in these collections:
Record created 2009-11-19, last modified 2013-05-22