Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology 2008
DOI: 10.1145/1477973.1477983
|View full text |Cite
|
Sign up to set email alerts
|

Guidelines for designing IT security management tools

Abstract: An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of design guidelines for such tools. We gathered guidelines and recommendations related to IT security management tools from the literature as well as from our own prior studies of IT security management. We categorized and combined these into a set of high level guidelines and identified the relationships between the guidelines and chal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
5

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 31 publications
(28 citation statements)
references
References 46 publications
(130 reference statements)
0
23
0
5
Order By: Relevance
“…Also, one could consider additional constructs of interest to system administrators. For example, Jaferian, Botta, Raja, Hawkey, & Beznosov (2008) identify design guidelines that span general usability, technical complexity (such as providing for task prioritization and multiple levels of information abstraction), organizational complexity (such as providing for archiving and supporting collaboration), and task-specific guidelines (such as providing support for rehearsing and meaningful errors). Ross, Weill, and Robertson (2006) identify different organizational operating models that leverage enterprise architecture for organizational strategy; these models include varying levels of business process integration and standardization, which can be reflected in the information systems employed.…”
Section: Limitationsmentioning
confidence: 99%
“…Also, one could consider additional constructs of interest to system administrators. For example, Jaferian, Botta, Raja, Hawkey, & Beznosov (2008) identify design guidelines that span general usability, technical complexity (such as providing for task prioritization and multiple levels of information abstraction), organizational complexity (such as providing for archiving and supporting collaboration), and task-specific guidelines (such as providing support for rehearsing and meaningful errors). Ross, Weill, and Robertson (2006) identify different organizational operating models that leverage enterprise architecture for organizational strategy; these models include varying levels of business process integration and standardization, which can be reflected in the information systems employed.…”
Section: Limitationsmentioning
confidence: 99%
“…There is also a body of work which seeks to improve communications between systems and security administrators of an organisation on the current risks from a cyberattack. From the academic perspective, Jaferian and colleagues [69,70] have researched this topic in depth and defined design guidelines for IT security-management tools and heuristics for their evaluation. In terms of security communications in particular, the authors posit that designers should use a range of different presentation/interaction methods to display information, meaningful messages should be used, and interfaces and alerts should be appropriate for and customisable by users [69].…”
Section: B Decision-making On Security Risksmentioning
confidence: 99%
“…From the academic perspective, Jaferian and colleagues [69,70] have researched this topic in depth and defined design guidelines for IT security-management tools and heuristics for their evaluation. In terms of security communications in particular, the authors posit that designers should use a range of different presentation/interaction methods to display information, meaningful messages should be used, and interfaces and alerts should be appropriate for and customisable by users [69]. Other work targeted towards security managers/administrators such as [71,72] exists, but proposed guidelines do not readily extend to the security-risk communication aspects of interest.…”
Section: B Decision-making On Security Risksmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, in order to evaluate the IdM systems, we adapted Nielsen's heuristics by selecting the ones that are relevant with respect to the ITSM context. We changed the focus of the selected heuristics to address complexity and stakeholder diversity in ITSM based on the guidelines for user-center design of ITSM tools [7]. To address the dimension of cooperation, these are then combined with Gutwin and Greenberg's [5] framework to articulate the mechanics of collaboration.…”
Section: Evaluation Of Identity Manage-ment Systemsmentioning
confidence: 99%