Challenges in evaluating complex IT security management systems - Pooya Jaferian et al - P. Jaferian, K. Hawkey, and K. Beznosov. Challenges in evaluating complex IT security management systems. In SOUPS Usable Security Experiment Reports (USER) Workshop, 2010.: - LERSSE-RefConfPaper-2010-005
 
<record>
  <controlfield tag="001">243</controlfield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">Usable Security</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">User Studies</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">Heuristic Evaluation </subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">IdM </subfield>
  </datafield>
</record>