Heuristics for evaluating IT security management tools

Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Konstantin Beznosov
2011 Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems - CHI EA '11  
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. In this paper, we explore how domain specific heuristics are created by examining prior research in the area of heuristic and guideline creation. We then describe our approach of creating usability heuristics for ITSM tools, which is based on guidelines for ITSM tools that are interpreted and abstracted with activity theory. With a between-subjects study, we
more » ... ed the employment of the ITSM and Nielsen's heuristics for evaluation of a commercial identity management system. Participants who used the ITSM set found more problems categorized as severe than those who used Nielsen's. We analyzed several aspects of our heuristics including the performance of individual participants using the heuristic, the performance of individual heuristics, the similarity of our heuristics to Nielsen's, and the participants' opinion about the use of heuristics for evaluation of IT security tools. We then discuss the implications of our results on the use of ITSM and Nielsen's heuristics for usability evaluation of ITSM tools. CONTENTS heuristics. Based on the result of evaluation and participants' feedback, we discuss how ITSM and Nielsen's heuristics can be employed for usability evaluation of ITSM tools. BACKGROUND AND RELATED WORK In this section, we provide a brief overview of the definition and scope of ITSM technologies before reviewing the prior research on the socio-technical aspects of ITSM. We then provide background on heuristic evaluation method, and domain specific heuristics. Finally, we provide a brief overview of activity theory.
doi:10.1145/1979742.1979820 dblp:conf/chi/JaferianHSB11 fatcat:g6s6imipjnfmvkxtmps2vrcjue