Home > Refereed Conference Papers > Challenges in evaluating complex IT security management systems > Keywords |
<record>
<controlfield tag="001">243</controlfield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Usable Security</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">User Studies</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Heuristic Evaluation </subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">IdM </subfield>
</datafield>
</record>