![]() |
Volumn , Issue , 2011, Pages 1633-1638
|
Heuristics for evaluating IT security management tools
|
Author keywords
Computer supported cooperative work; Heuristic evaluation; IT security management
|
Indexed keywords
AUTHENTICATION;
COMPUTER SUPPORTED COOPERATIVE WORK;
HUMAN COMPUTER INTERACTION;
SECURITY SYSTEMS;
USABILITY ENGINEERING;
ACTIVITY THEORY;
COMPUTER-SUPPORTED COOPERATIVE WORKS;
HEURISTIC EVALUATION;
IDENTITY MANAGEMENT SYSTEMS;
IT SECURITY;
IT SECURITY MANAGEMENT;
MANAGEMENT TOOL;
NIELSEN;
SECURITY MANAGEMENT;
USABILITY HEURISTICS;
HEURISTIC METHODS;
|
EID: 79957945178
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1979742.1979820 Document Type: Conference Paper |
Times cited : (6)
|
References (6)
|