메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1633-1638

Heuristics for evaluating IT security management tools

Author keywords

Computer supported cooperative work; Heuristic evaluation; IT security management

Indexed keywords

AUTHENTICATION; COMPUTER SUPPORTED COOPERATIVE WORK; HUMAN COMPUTER INTERACTION; SECURITY SYSTEMS; USABILITY ENGINEERING;

EID: 79957945178     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1979742.1979820     Document Type: Conference Paper
Times cited : (6)

References (6)
  • 3
    • 0037998950 scopus 로고    scopus 로고
    • Empirical development of a heuristic evaluation methodology for shared workspace groupware
    • Baker, K., Greenberg, S., Gutwin, C. Empirical development of a heuristic evaluation methodology for shared workspace groupware. In CSCW. 2002, 96-105.
    • CSCW. 2002 , pp. 96-105
    • Baker, K.1    Greenberg, S.2    Gutwin, C.3
  • 4
    • 70350697857 scopus 로고    scopus 로고
    • Guidelines for designing IT security management tools
    • Jaferian, P., Botta, D., Raja, F., Hawkey, K., and Beznosov, K. Guidelines for Designing IT Security Management Tools. In CHIMIT. 2008, 7:1-7:10.
    • (2008) CHIMIT , pp. 71-710
    • Jaferian, P.1    Botta, D.2    Raja, F.3    Hawkey, K.4    Beznosov, K.5
  • 5
    • 85049653881 scopus 로고    scopus 로고
    • Heuristic evaluation of user interfaces
    • Nielsen, J. and Molich, R. Heuristic evaluation of user interfaces. In CHI, 1990, 249-256.
    • CHI , vol.1990 , pp. 249-256
    • Nielsen, J.1    Molich, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.