000000253 001__ 253
000000253 005__ 20130522141941.0
000000253 037__ $$aLERSSE-RefConfPaper-2011-002
000000253 100__ $$aPooya Jaferian
000000253 245__ $$aHeuristics for Evaluating IT Security Management Tools
000000253 260__ $$c2011-02-24
000000253 300__ $$a6
000000253 520__ $$aThe usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, ITSM occurs within a complex and collaborative context that involves diverse stakeholders; this makes standard usability heuristics difficult to apply. We propose a set of ITSM usability heuristics that are based on activity theory and supported by prior research. We performed a study to compare the use of the ITSM heuristics to Nielsen's heuristics for the evaluation of a commercial identity management system. Our preliminary results show that our new ITSM heuristics performed well in finding usability problems. However, we need to perform the study with more participants and perform more detailed analysis to precisely show the differences in applying the ITSM heuristics as compared to Nielsen’s heuristics. 
000000253 6531_ $$aUsable Security
000000253 6531_ $$aUser Studies
000000253 6531_ $$aHeuristic Evaluation
000000253 6531_ $$aIdM 
000000253 700__ $$aKirstie Hawkey
000000253 700__ $$aAndreas Sotirakopoulos
000000253 700__ $$aKonstantin Beznosov
000000253 8560_ $$fpooya@ece.ubc.ca
000000253 8564_ $$uhttp://lersse-dl.ece.ubc.ca/record/253/files/253.pdf$$yTransfer from CDS 0.99.7
000000253 909C4 $$pPooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, and Konstantin Beznosov, Heuristics for Evaluating IT Security Management Tools, In Proceedings of the 29th international conference extended abstracts on Human factors in computing systems (CHI '11), Vancouver, Canada, 2011. 
000000253 980__ $$aRefConfPaper