2009
DOI: 10.1108/09685220910944731
|View full text |Cite
|
Sign up to set email alerts
|

A cognitive walkthrough of Autopsy Forensic Browser

Abstract: PurposeThe purpose of this paper is to review the usability of the Autopsy Forensic Browser in order to improve future versions of this, or similar, tools.Design/methodology/approachThe software Autopsy Forensic Browser was analysed for usability using a cognitive walkthrough approach.FindingsThe results of the evaluation indicate that there are many areas where usability could be improved and these are classified into areas of eight overlapping areas. Examples from each area are presented, with suggestions as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
12
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 6 publications
0
12
0
Order By: Relevance
“…These approaches are, user studies and expert-based evaluations [29,30]. In the first of these methods, a representative sample of users is recruited to participate in experiments to test a system's usability.…”
Section: How Is Cybersecurity Usability Being Evaluated?mentioning
confidence: 99%
See 4 more Smart Citations
“…These approaches are, user studies and expert-based evaluations [29,30]. In the first of these methods, a representative sample of users is recruited to participate in experiments to test a system's usability.…”
Section: How Is Cybersecurity Usability Being Evaluated?mentioning
confidence: 99%
“…In this area, cognitive walkthroughs (where evaluators step through a system looking for areas that may negatively affect usability) and heuristic evaluations (testing a system against a set of usability rules) are two of the most prevalent methods [30]. Further examples of the use of heuristic evaluations are apparent in [33] where the authors assess a personal firewall according to HCI-S criteria, and in [34] where the evaluation of security tool alerts is based on preset security usability rules.…”
Section: How Is Cybersecurity Usability Being Evaluated?mentioning
confidence: 99%
See 3 more Smart Citations