Heuristics for evaluating IT security management tools

CHI '11: CHI Conference on Human Factors in Computing Systems Vancouver BC Canada May, 2011(2011)

引用 94|浏览0
暂无评分
摘要
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, ITSM occurs within a complex and collaborative context that involves diverse stakeholders; this makes standard usability heuristics difficult to apply. We propose a set of ITSM usability heuristics that are based on activity theory and supported by prior research. We performed a study to compare the use of the ITSM heuristics to Nielsen's heuristics for the evaluation of a commercial identity management system. Our preliminary results show that our new ITSM heuristics performed well in finding usability problems. However, we need to perform the study with more participants and perform more detailed analysis to precisely show the differences in applying the ITSM heuristics as compared to Nielsen's heuristics.
更多
查看译文
关键词
new itsm heuristics,commercial identity management system,itsm usability heuristics,it security management tool,activity theory,heuristic evaluation,it security management,usability problem,standard usability,collaborative context,itsm heuristics,complex systems,computer supported cooperative work
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要