A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Heuristics for evaluating IT security management tools
2011
Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems - CHI EA '11
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. In this paper, we explore how domain specific heuristics are created by examining prior research in the area of heuristic and guideline creation. We then describe our approach of creating usability heuristics for ITSM tools, which is based on guidelines for ITSM tools that are interpreted and abstracted with activity theory. With a between-subjects study, we
doi:10.1145/1979742.1979820
dblp:conf/chi/JaferianHSB11
fatcat:g6s6imipjnfmvkxtmps2vrcjue