Heuristics for Evaluating IT Security Management Tools - Pooya Jaferian et al - Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, and Konstantin Beznosov, Heuristics for Evaluating IT Security Management Tools, In Proceedings of the 29th international conference extended abstracts on Human factors in computing systems (CHI '11), Vancouver, Canada, 2011. : - LERSSE-RefConfPaper-2011-002
 
<record>
  <controlfield tag="001">253</controlfield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">Usable Security</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">User Studies</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">Heuristic Evaluation</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">IdM </subfield>
  </datafield>
</record>