Heuristic evaluation of user interfaces
CHI '90 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
User interface evaluation in the real world: a comparison of four techniques
CHI '91 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Designing interaction
Finding usability problems through heuristic evaluation
CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Ghosts in the network: distributed troubleshooting in a shared working environment
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
CHI '95 Conference Companion on Human Factors in Computing Systems
Context and consciousness: activity theory and human-computer interaction
Context and consciousness: activity theory and human-computer interaction
Activity theory as a potential framework for human-computer interaction research
Context and consciousness
CHI '94 Conference Companion on Human Factors in Computing Systems
Social translucence: an approach to designing systems that support social processes
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on human-computer interaction in the new millennium, Part 1
Creating creativity: user interfaces for supporting innovation
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on human-computer interaction in the new millennium, Part 1
Distributed cognition: toward a new foundation for human-computer interaction research
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on human-computer interaction in the new millennium, Part 2
HCI in the global knowledge-based economy: designing to support worker adaptation
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on human-computer interaction in the new millennium, Part 2
Usability engineering: scenario-based development of human-computer interaction
Usability engineering: scenario-based development of human-computer interaction
A survey of user-centered design practice
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Designing the User Interface: Strategies for Effective Human-Computer Interaction
Designing the User Interface: Strategies for Effective Human-Computer Interaction
Usability Engineering
Empirical development of a heuristic evaluation methodology for shared workspace groupware
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Collaboration as an Activity Coordinating with Pseudo-Collective Objects
Computer Supported Cooperative Work
NetWORKers and their Activity in IntensionalNetworks
Computer Supported Cooperative Work
Heuristic evaluation of ambient displays
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Heuristic Evaluation of Groupware Based on the Mechanics of Collaboration
EHCI '01 Proceedings of the 8th IFIP International Conference on Engineering for Human-Computer Interaction
WETICE '00 Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Post-cognitivist HCI: second-wave theories
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Notification and awareness: synchronizing task-oriented collaborative activity
International Journal of Human-Computer Studies - Notification user interfaces
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Locales Framework: Exploring Foundations for Collaboration Support
OZCHI '96 Proceedings of the 6th Australian Conference on Computer-Human Interaction (OZCHI '96)
Using usability heuristics to evaluate patient safety of medical devices
Journal of Biomedical Informatics - Patient safety
Why there aren't more information security research studies
Information and Management
Evaluating computer-supported cooperative work: models and frameworks
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
I know my network: collaboration and expertise in intrusion detection
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Human-Computer Interaction: Developing Effective Organizational Information Systems
Human-Computer Interaction: Developing Effective Organizational Information Systems
Acting with Technology: Activity Theory and Interaction Design (Acting with Technology)
Acting with Technology: Activity Theory and Interaction Design (Acting with Technology)
Design guidelines for system administration tools developed through ethnographic field studies
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A knowledge architecture for IT security
Communications of the ACM - Creating a science of games
Towards understanding IT security professionals and their tools
Proceedings of the 3rd symposium on Usable privacy and security
Heuristic evaluation for games: usability principles for video game design
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Human, organizational, and technological factors of IT security
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Commentary on "Damaged merchandise?"
Human-Computer Interaction
Work practices of system administrators: implications for tool design
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Sysadmins and the need for verification information
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Guidelines for designing IT security management tools
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Real life challenges in access-control management
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
International Journal of Human-Computer Studies
Toward understanding distributed cognition in IT security management: the role of cues and norms
Cognition, Technology and Work
Vendor Analysis: IT security: the product vendor landscape
Network Security
Hi-index | 0.00 |
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, standard usability heuristics are hard to apply as IT security management occurs within a complex and collaborative context that involves diverse stakeholders. We propose a set of ITSM usability heuristics that are based on activity theory, are supported by prior research, and consider the complex and cooperative nature of security management. In a between-subjects study, we compared the employment of the ITSM and Nielsen's heuristics for evaluation of a commercial identity management system. Participants who used the ITSM set found more problems categorized as severe than those who used Nielsen's. As evaluators identified different types of problems with the two sets of heuristics, we recommend employing both the ITSM and Nielsen's heuristics during evaluation of ITSM tools.