Home > Refereed Journal Papers > Heuristics for Evaluating IT Security Management Tools > Keywords |
<record>
<controlfield tag="001">287</controlfield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Heuristic Evaluation </subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">IT Security </subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Usable Security</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Computer Supported Cooperative Work</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Activity Theory</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Usability Evaluation </subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Identity Management </subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Access Management</subfield>
</datafield>
</record>