skip to main content
10.1145/2078827.2078837acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Heuristics for evaluating IT security management tools

Published:20 July 2011Publication History

ABSTRACT

The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, standard usability heuristics are hard to apply as IT security management occurs within a complex and collaborative context that involves diverse stakeholders. We propose a set of ITSM usability heuristics that are based on activity theory, are supported by prior research, and consider the complex and cooperative nature of security management. In a between-subjects study, we compared the employment of the ITSM and Nielsen's heuristics for evaluation of a commercial identity management system. Participants who used the ITSM set found more problems categorized as severe than those who used Nielsen's. As evaluators identified different types of problems with the two sets of heuristics, we recommend employing both the ITSM and Nielsen's heuristics during evaluation of ITSM tools.

References

  1. K. Baker, S. Greenberg, and C. Gutwin. Heuristic evaluation of groupware based on the mechanics of collaboration. Lecture Notes in Computer Science, pages 123--140, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. K. Baker, S. Greenberg, and C. Gutwin. Empirical development of a heuristic evaluation methodology for shared workspace groupware. In Proceedings of the 2002 ACM conference on Computer supported cooperative work, CSCW '02, pages 96--105, New York, NY, USA, 2002. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter, and K. Vaniea. Real life challenges in access-control management. In CHI '09: Proceedings of the 27th international conference on Human factors in computing systems, pages 899--908, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Beal. IT security: the product vendor landscape. Network Security, 2005(5):9--10, 5 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Botta, K. Muldner, K. Hawkey, and K. Beznosov. Toward understanding distributed cognition in IT security management: the role of cues and norms. Int. Journal of Cognition, Technology & Work, Online First, September 2010. DOI: 10.1007/s10111-010-0159-y, 2010. Google ScholarGoogle ScholarCross RefCross Ref
  6. D. Botta, R. Werlinger, A. Gagné, K. Beznosov, L. Iverson, S. Fels, and B. Fisher. Towards understanding IT security professionals and their tools. In Proc. of Symp. On Usable Privacy and Security (SOUPS), pages 100--111, Pittsburgh, PA, July 18--20 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. M. Carroll, D. C. Neale, P. L. Isenhour, M. B. Rosson, and D. S. McCrickard. Notification and awareness: synchronizing task-oriented collaborative activity. International Journal of Human-Computer Studies, 58(5):605--632, 2003. Notification User Interfaces. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Charmaz. Constructing Grounded Theory. SAGE publications, 2006.Google ScholarGoogle Scholar
  9. P. Dourish and D. Redmiles. An approach to usable security based on event monitoring and visualization. In NSPW '02: Proceedings of the 2002 workshop on New security paradigms, pages 75--81, New York, NY, USA, 2002. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Engeström. Activity theory and individual and social transformation. Perspectives on activity theory, pages 19--38, 1999.Google ScholarGoogle Scholar
  11. T. Erickson and W. A. Kellogg. Social translucence: an approach to designing systems that support social processes. ACM Trans. Comput.-Hum. Interact., 7(1):59--83, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. G. Fitzpatrick, T. Mansfield, and S. Kaplan. Locales framework: Exploring foundations for collaboration support. In CHI'96 Sixth Australian Conference on Computer-Human Interaction, Hamilton, New Zealand, November 24--27, 34--41 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Gagné, K. Muldner, and K. Beznosov. Identifying differences between security and other IT professionals: a qualitative analysis. In HAISA'08: Human Aspects of Information Security and Assurance, pages 69--80, Plymouth, England, July 8--9 2008.Google ScholarGoogle Scholar
  14. J. R. Goodall, W. G. Lutters, and A. Komlodi. I know my network: Collaboration and expertise in intrusion detection. In CSCW '04, pages 342--345, November 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Greenberg, G. Fitzpatrick, C. Gutwin, and S. Kaplan. Adapting the locales framework for heuristic evaluation of groupware. Australian Journal of Information Systems, 7(2):102--108, 2000.Google ScholarGoogle Scholar
  16. C. Gutwin and S. Greenberg. The mechanics of collaboration: developing low cost usabilityevaluation methods for shared workspaces. IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2000. (WET ICE 2000). Proeedings, pages 98--103, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. E. M. Haber and J. Bailey. Design guidelines for system administration tools developed through ethnographic field studies. In CHIMIT '07: Proceedings of the 2007 symposium on Computer human interaction for the management of information technology, pages 1:1--1:9, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. H. R. Hartson, T. S. Andre, and R. C. Williges. Criteria for evaluating usability evaluation methods. International Journal of Human-Computer Interaction, 13(4):373--410, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  19. K. Hawkey, D. Botta, R. Werlinger, K. Muldner, A. Gagne, and K. Beznosov. Human, Organizational, and Technological Factors of IT Security. In CHI '08 extended abstract on Human factors in computing systems, pages 3639--3644, Florence, Italy, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Hollan, E. Hutchins, and D. Kirsh. Distributed cognition: toward a new foundation for human-computer interaction research. ACM Trans. Comput.-Hum. Interact., 7(2):174--196, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. P. Jaferian, D. Botta, F. Raja, K. Hawkey, and K. Beznosov. Guidelines for Designing IT Security Management Tools. In CHIMIT '08: Proceedings of the 2008 symposium on Computer Human Interaction for the Management of Information Technology, pages 7:1--7:10. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Jeffries, J. R. Miller, C. Wharton, and K. Uyeda. User interface evaluation in the real world: a comparison of four techniques. In CHI '91: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 119--124, New York, NY, USA, 1991. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. V. Kaptelinin and B. Nardi. Acting with technology: Activity theory and interaction design. MIT Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. V. Kaptelinin, B. Nardi, S. Bodker, J. Carroll, J. Hollan, E. Hutchins, and T. Winograd. Post-cognitivist HCI: second-wave theories. In CHI '03: CHI '03 extended abstracts on Human factors in computing systems, pages 692--693, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Kesh and P. Ratnasingam. A knowledge architecture for it security. Commun. ACM, 50(7):103--108, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. G. Kotulic and J. G. Clark. Why there aren't more information security research studies. Information & Management, 41(5):597--607, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. K. Kuutti. Activity theory as a potential framework for human-computer interaction research, pages 17--44. Massachusetts Institute of Technology, Cambridge, MA, USA, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. P. P. Maglio, E. Kandogan, and E. Haber. Distributed cognition and joint activity in collaborative problem solving. In Proceedings of the Twenty-fifth Annual Conference of the Cognitive Science Society, 2003.Google ScholarGoogle Scholar
  29. J. Mankoff, A. K. Dey, G. Hsieh, J. Kientz, S. Lederer, and M. Ames. Heuristic evaluation of ambient displays. In Proc. CHI '03, pages 169--176, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. J. Muller and A. McClard. Validating an extension to participatory heuristic evaluation: quality of work and quality of work life. In CHI '95: Conference companion on Human factors in computing systems, pages 115--116, New York, NY, USA, 1995. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. B. A. Nardi, editor. Context and consciousness: activity theory and human-computer interaction. Massachusetts Institute of Technology, Cambridge, MA, USA, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. B. A. Nardi, S. Whittaker, and H. Schwarz. NetWORKers and their activity in intensional networks. Computer Supported Cooperative Work (CSCW), 11(1):205--242, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. D. C. Neale, J. M. Carroll, and M. B. Rosson. Evaluating computer-supported cooperative work: models and frameworks. In CSCW '04, pages 112--121. ACM Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. J. Nielsen. How to conduct a heuristic evaluation. http://www.useit.com/papers/heuristic/heuristic_evaluation.html.Google ScholarGoogle Scholar
  35. J. Nielsen. Finding usability problems through heuristic evaluation. In Proc. CHI '92, pages 373--380, New York, NY, USA, 1992. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. J. Nielsen. Usability Engineering. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. J. Nielsen. Usability inspection methods. In CHI '94: Conference companion on Human factors in computing systems, pages 413--414, New York, NY, USA, 1994. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. J. Nielsen and R. Molich. Heuristic evaluation of user interfaces. In CHI '90: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 249--256, New York, NY, USA, 1990. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. D. A. Norman. Cognitive Engineering. Lawrence Erlbaum Associates, Hillsdale, NJ, 1986.Google ScholarGoogle Scholar
  40. D. A. Norman. Cognitive artifacts. Designing interaction: Psychology at the human-computer interface, pages 17--38, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. G. Olson and T. Moran. Commentary on" Damaged Merchandise?". Human-Computer Interaction, 13(3):263--323, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. D. Pinelle, N. Wong, and T. Stach. Heuristic evaluation for games: usability principles for video game design. In Proc. CHI '08, pages 1453--1462, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. P. Rabardel and G. Bourmaud. From computer to instrument system: a developmental perspective. Interacting with Computers, 15(5):665--691, 2003. From Computer Artefact to Instrument for Mediated Activity. Part 1 Organizational Issues.Google ScholarGoogle ScholarCross RefCross Ref
  44. Y. Rogers. Ghosts in the network: distributed troubleshooting in a shared working environment. In CSCW '92: Proceedings of the 1992 ACM conference on Computer-supported cooperative work, pages 346--355, Toronto, ON, Canada, 1992. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. M. B. Rosson and J. M. Carroll. Usability engineering: scenario-based development of human-computer interaction. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. P. Sarbanes. Sarbanes-Oxley Act of 2002. In The Public Company Accounting Reform and Investor Protection Act. Washington DC: US Congress, 2002.Google ScholarGoogle Scholar
  47. B. Shneiderman. Designing the User Interface: Strategies for Effective Human-Computer Interaction. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. B. Shneiderman. Creating creativity: user interfaces for supporting innovation. ACM Trans. Comput.-Hum. Interact., 7(1):114--138, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. A. Sutcliffe and B. Gault. Heuristic evaluation of virtual reality applications. Interacting with Computers, 16(4):831--849, 2004. Human Computer Interaction in Latin America.Google ScholarGoogle ScholarCross RefCross Ref
  50. D. Te'eni, J. Carey, and P. Zhang. Human Computer Interaction: developing effective organizational information systems. Wiley, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. R. S. Thompson, E. M. Rantanen, W. Yurcik, and B. P. Bailey. Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection. In CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems, page 1205, San Jose, CA, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. N. F. Velasquez and A. Durcikova. Sysadmins and the need for verification information. In CHiMiT '08: Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, pages 1--8, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. N. F. Velasquez and S. P. Weisband. Work practices of system administrators: implications for tool design. In CHiMiT '08: Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, pages 1--10, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. K. J. Vicente. HCI in the global knowledge-based economy: designing to support worker adaptation. ACM Trans. Comput.-Hum. Interact., 7(2):263--280, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. K. Vredenburg, J.-Y. Mao, P. W. Smith, and T. Carey. A survey of user-centered design practice. In CHI '02: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 471--478, New York, NY, USA, 2002. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. R. Werlinger, K. Hawkey, and K. Beznosov. An integrated view of human, organizational, and technological challenges of IT security management. Journal of Information Management & Computer Security, 17(1):4--19, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  57. R. Werlinger, K. Hawkey, D. Botta, and K. Beznosov. Security practitioners in context: Their activities and interactions with other stakeholders within organizations. International Journal of Human-Computer Studies, 67(7):584--606, March 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. D. Zager. Collaboration as an activity coordinating with pseudo-collective objects. Computer Supported Cooperative Work (CSCW), 11(1):181--204, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. J. Zhang, T. R. Johnson, V. L. Patel, D. L. Paige, and T. Kubose. Using usability heuristics to evaluate patient safety of medical devices. Journal of Biomedical Informatics, 36(1--2):23--30, 2003. Patient Safety. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. A. T. Zhou, J. Blustein, and N. Zincir-Heywood. Improving intrusion detection systems through heuristic evaluation. In in IEEE Canadian Conf. on Electrical B. and Computer Engineering (CCECE), pages 1641--1644, 2004.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Heuristics for evaluating IT security management tools

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SOUPS '11: Proceedings of the Seventh Symposium on Usable Privacy and Security
      July 2011
      253 pages
      ISBN:9781450309110
      DOI:10.1145/2078827

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 July 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate15of49submissions,31%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader