Ghosts in the network: distributed troubleshooting in a shared working environment
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Journal of the American Society for Information Science - Special issue on current research in human-computer interaction
Guidelines for using multiple views in information visualization
AVI '00 Proceedings of the working conference on Advanced visual interfaces
Reading of electronic documents: the usability of linear, fisheye, and overview+detail interfaces
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An empirical study of industrial security-engineering practices
Journal of Systems and Software
Applying Discount Usability Engineering
IEEE Software
Ecological interface design: a new approach for visualizing network management
Computer Networks: The International Journal of Computer and Telecommunications Networking
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 4 - Volume 4
Home-centric visualization of network traffic for security administration
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Field studies of computer system administrators: analysis of system management tools and practices
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Social navigation as a model for usable security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
IDS RainStorm: Visualizing IDS Alarms
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
A User-centered Look at Glyph-based Security Visualization
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers
Proceedings of the 3rd international workshop on Visualization for computer security
interactions - Help! User assistance and HCI
Research-Based Web Design & Usability Guidelines
Research-Based Web Design & Usability Guidelines
Design guidelines for system administration tools developed through ethnographic field studies
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
User help techniques for usable security
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
Midweight collaborative remembering: wikis in the workplace
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
System guidelines for co-located, collaborative work on a tabletop display
ECSCW'03 Proceedings of the eighth conference on European Conference on Computer Supported Cooperative Work
A knowledge architecture for IT security
Communications of the ACM - Creating a science of games
Towards understanding IT security professionals and their tools
Proceedings of the 3rd symposium on Usable privacy and security
Human, organizational, and technological factors of IT security
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Security practitioners in context: their activities and interactions
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs
IEEE Internet Computing
The challenges of using an intrusion detection system: is it worth the effort?
Proceedings of the 4th symposium on Usable privacy and security
Usable autonomic computing systems: The system administrators' perspective
Advanced Engineering Informatics
Vendor Analysis: IT security: the product vendor landscape
Network Security
An intelligent contextual support system for intrusion detection tasks
Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology
A case study of enterprise identity management system adoption in an insurance organization
Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology
Storage administration: field findings and software design guidelines
Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology
Proceedings of the 2010 workshop on New security paradigms
Heuristics for evaluating IT security management tools
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Heuristics for evaluating IT security management tools
Proceedings of the Seventh Symposium on Usable Privacy and Security
Hi-index | 0.00 |
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of design guidelines for such tools. We gathered guidelines and recommendations related to IT security management tools from the literature as well as from our own prior studies of IT security management. We categorized and combined these into a set of high level guidelines and identified the relationships between the guidelines and challenges in IT security management. We also illustrated the need for the guidelines, where possible, with quotes from additional interviews with five security practitioners. Our framework of guidelines can be used by those developing IT security tools, as well as by practitioners and managers evaluating tools.