763
Views
18
CrossRef citations to date
0
Altmetric
Original Articles

Heuristics for Evaluating IT Security Management Tools

, , , &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Peter E. D. Love, Lavagnon A. Ika & Jeffrey K. Pinto. (2023) Smart heuristics for decision-making in the ‘wild’: Navigating cost uncertainty in the construction of large-scale transport projects. Production Planning & Control 0:0, pages 1-18.
Read now
Iverton B. Lima & Wonil Hwang. (2023) Effects of Heuristic Type, User Interaction Level, and Evaluator’s Characteristics on Usability Metrics of Augmented Reality (AR) User Interfaces. International Journal of Human–Computer Interaction 0:0, pages 1-18.
Read now

Articles from other publishers (16)

Stefano Filippi & Barbara Motyl. (2021) Interactive redesign of products' User eXperience: how to. International Journal on Interactive Design and Manufacturing (IJIDeM) 16:1, pages 65-80.
Crossref
Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles & Dan Scofield. (2020) An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center. An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center.
Rowida Alharbi, Haikel Alhichri & Yakoub Bazi. (2020) Selective Data Augmentation Approach for Remote Sensing Scene Classification. Selective Data Augmentation Approach for Remote Sensing Scene Classification.
André de Lima Salgado, Renata Pontin de Mattos Fortes, Ricardo Ramos de Oliveira & André Pimenta Freire. (2020) Usability heuristics on parental privacy controls for smart toys: From an exploratory map to a confirmatory research. Electronic Commerce Research and Applications 42, pages 100984.
Crossref
Robert Bucki & Petr Suchánek. (2019) Comparative Simulation Analysis of the Performance of the Logistics Manufacturing System at the Operative Level. Complexity 2019, pages 1-36.
Crossref
Laima Kaušpadienė. 2019. Information security management framework for small and medium enterprise. Information security management framework for small and medium enterprise.
Daniela Quiñones, Cristian Rusu & Virginica Rusu. (2018) A methodology to develop usability/user experience heuristics. Computer Standards & Interfaces 59, pages 109-129.
Crossref
Samar Swaid, Mnsa Maat, Hari Krishnan, Devarshi Ghoshal & Lavanya Ramakrishnan. 2018. Advances in Usability and User Experience. Advances in Usability and User Experience 471 482 .
Daniela Quiñones & Cristian Rusu. (2017) How to develop usability heuristics: A systematic literature review. Computer Standards & Interfaces 53, pages 89-122.
Crossref
Dali Zhu, Na Pang, Gang Li & Wenjing Rong. (2016) Opportunistic Probe: An Efficient Adaptive Detection Model for Collaborative Intrusion Detection. Opportunistic Probe: An Efficient Adaptive Detection Model for Collaborative Intrusion Detection.
Cigdem Altin Gumussoy. (2016) Usability guideline for banking software design. Computers in Human Behavior 62, pages 277-285.
Crossref
Setia Hermawati & Glyn Lawson. (2016) Establishing usability heuristics for heuristics evaluation in a specific domain: Is there a consensus?. Applied Ergonomics 56, pages 34-51.
Crossref
Saurabh Dutta, Stuart Madnick & Ger Joyce. 2016. HCI International 2016 – Posters' Extended Abstracts. HCI International 2016 – Posters' Extended Abstracts 471 475 .
Erik E. Northrop & Heather R. Lipford. (2014) Exploring the Usability of Open Source Network Forensic Tools. Exploring the Usability of Open Source Network Forensic Tools.
Peter Love, Lavagnon A. Ika & Jeffrey K. Pinto. (2022) Fast-and-Frugal Decision-Making: Setting a Research Agenda for Navigating Uncertainty in Large-Scale Transport Projects. SSRN Electronic Journal.
Crossref
Dr Saad Butt & Vera Anatollevna Gnevasheva. (2018) Efficiency in the Processes of Intrusion Detection System Through Usability Evaluation Methods. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.