Login / Signup

Heuristics for evaluating IT security management tools.

Pooya JaferianKirstie HawkeyAndreas SotirakopoulosKonstantin Beznosov
Published in: CHI Extended Abstracts (2011)
Keyphrases
  • management tools
  • web applications
  • information security
  • intrusion detection
  • metadata
  • knowledge management
  • end users
  • data management
  • semantic web technologies
  • project management
  • data mining
  • artificial intelligence