Heuristics for Evaluating IT Security Management Tools

Human-Computer Interaction - United States
doi 10.1080/07370024.2013.819198