Empirical development of a heuristic evaluation methodology for shared workspace groupware
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Heuristic evaluation of ambient displays
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Acting with Technology: Activity Theory and Interaction Design (Acting with Technology)
Acting with Technology: Activity Theory and Interaction Design (Acting with Technology)
Towards understanding IT security professionals and their tools
Proceedings of the 3rd symposium on Usable privacy and security
Guidelines for designing IT security management tools
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Hi-index | 0.00 |
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, ITSM occurs within a complex and collaborative context that involves diverse stakeholders; this makes standard usability heuristics difficult to apply. We propose a set of ITSM usability heuristics that are based on activity theory and supported by prior research. We performed a study to compare the use of the ITSM heuristics to Nielsen's heuristics for the evaluation of a commercial identity management system. Our preliminary results show that our new ITSM heuristics performed well in finding usability problems. However, we need to perform the study with more participants and perform more detailed analysis to precisely show the differences in applying the ITSM heuristics as compared to Nielsen's heuristics.