Guidelines for designing IT security management tools

Guidelines for designing IT security management tools,10.1145/1477973.1477983,Pooya Jaferian,David Botta,Fahimeh Raja,Kirstie Hawkey,Konstantin Beznos

Guidelines for designing IT security management tools   (Citations: 7)
BibTex | RIS | RefWorks Download
ABSTRACT An important factor that impacts the eectiveness,of secu- rity systems within an organization is the usability of secu- rity management tools. In this paper, we present a survey of design guidelines for such tools. We gathered guidelines and recommendations,related to IT security management,tools from the literature as well as from our own,prior studies of IT security management.,We categorized and combined these into a set of high level guidelines and identied,the relationships between the guidelines and challenges in IT security management.,We also illustrated the need for the guidelines, where possible, with quotes from additional in- terviews with,ve security practitioners. Our framework of guidelines can be used by those developing IT security tools, as well as by practitioners and managers evaluating tools. Categories and Subject Descriptors K.6.5 [Management of Computing and Information Systems]: Security and Protection; H.5.2 [Information Interfaces and Presentation]: UIs|Interaction Styles; H.5.3 [Information Interfaces and Presentation]: Group and Org. Interfaces|Collaborative Computing General Terms
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
Sort by: