Guidelines for designing IT security management tools

  • Authors:
  • Pooya Jaferian;David Botta;Fahimeh Raja;Kirstie Hawkey;Konstantin Beznosov

  • Affiliations:
  • University of British Columbia, Vancouver, Canada;University of British Columbia, Vancouver, Canada;University of British Columbia, Vancouver, Canada;University of British Columbia, Vancouver, Canada;University of British Columbia, Vancouver, Canada

  • Venue:
  • Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of design guidelines for such tools. We gathered guidelines and recommendations related to IT security management tools from the literature as well as from our own prior studies of IT security management. We categorized and combined these into a set of high level guidelines and identified the relationships between the guidelines and challenges in IT security management. We also illustrated the need for the guidelines, where possible, with quotes from additional interviews with five security practitioners. Our framework of guidelines can be used by those developing IT security tools, as well as by practitioners and managers evaluating tools.