Heuristics for Evaluating IT Security Management Tools

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design guidelines for IT security management tools

One of the most important factors that impact usability of security systems within an organization are security tools. In this paper, we report preliminary results of our survey about design guidelines for IT security management tools. We gathered guidelines and recommendations related to IT security management tool from available literature as well as result of our previous studies on IT secur...

متن کامل

Evaluating security tools towards usable security

The main success of the internet is its openness. To guarantee security in the internet for example to protect the user’s privacy or the security of online transactions the use of security tools is essential. Because today’s internet users cover almost all educational levels and professional groups, we assume that they will be mostly security novices. Unfortunately, the usage of today’s securit...

متن کامل

Challenges in evaluating complex IT security management systems

Performing ecologically valid user studies for IT security management (ITSM) systems is challenging. The users of these systems are security professionals who are difficult to recruit for interviews, let alone controlled user studies. Furthermore, evaluation of ITSM systems inherits the difficulties of studying collaborative and complex systems. During our research, we have encountered many cha...

متن کامل

Innovation Management of Enterprises: Legal Provision and Analytical Tools for Evaluating Business Strategies

The article investigates the peculiarities of the enterprise's innovation activity and its legal regulation, conducts the evaluation of the business strategy for chemical companies according to the manufacturer’s principles of innovation management. The purpose of the paper is to evaluate the business strategy of chemical companies according to the manufacturer’s principles of innovation manage...

متن کامل

Effectiveness of IT Security Tools in Practice

In today’s world, IT security plays a critical role in different organizations, yet little is known about IT security in the context of organizations. This paper addresses this issue based on qualitative description analysis of 10 interviews with IT security practitioners from small to medium size organizations. Our results revealed the required knowledge and skills for effective IT security, I...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Human–Computer Interaction

سال: 2014

ISSN: 0737-0024,1532-7051

DOI: 10.1080/07370024.2013.819198