Publication statistics

Pub. period:2008-2011
Pub. count:7
Number of co-authors:8



Co-authors

Number of publications with 3 favourite co-authors:

Kirstie Hawkey:7
Konstantin Beznosov:7
David Botta:4

 

 

Productive colleagues

Pooya Jaferian's 3 most productive colleagues in number of publications:

Kirstie Hawkey:37
Konstantin Beznoso..:23
Kasia Muldner:12
 
 
 

Upcoming Courses

go to course
User Experience: The Beginner's Guide
90% booked. Starts in 5 days
go to course
User-Centred Design - Module 2
89% booked. Starts in 6 days
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Pooya Jaferian

 

Publications by Pooya Jaferian (bibliography)

 what's this?
2011
 
Edit | Del

Jaferian, Pooya, Hawkey, Kirstie, Sotirakopoulos, Andreas and Beznosov, Konstantin (2011): Heuristics for evaluating IT security management tools. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 1633-1638. Available online

The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, ITSM occurs within a complex and collaborative context that involves diverse stakeholders; this makes standard usability heuristics difficult to apply. We propose a set of ITSM usability heuristics that are based on activity theory and supported by prior research. We performed a study to compare the use of the ITSM heuristics to Nielsen's heuristics for the evaluation of a commercial identity management system. Our preliminary results show that our new ITSM heuristics performed well in finding usability problems. However, we need to perform the study with more participants and perform more detailed analysis to precisely show the differences in applying the ITSM heuristics as compared to Nielsen's heuristics.

© All rights reserved Jaferian et al. and/or their publisher

 
Edit | Del

Jaferian, Pooya, Hawkey, Kirstie, Sotirakopoulos, Andreas, Velez-Rojas, Maria and Beznosov, Konstantin (2011): Heuristics for evaluating IT security management tools. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 7. Available online

The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, standard usability heuristics are hard to apply as IT security management occurs within a complex and collaborative context that involves diverse stakeholders. We propose a set of ITSM usability heuristics that are based on activity theory, are supported by prior research, and consider the complex and cooperative nature of security management. In a between-subjects study, we compared the employment of the ITSM and Nielsen's heuristics for evaluation of a commercial identity management system. Participants who used the ITSM set found more problems categorized as severe than those who used Nielsen's. As evaluators identified different types of problems with the two sets of heuristics, we recommend employing both the ITSM and Nielsen's heuristics during evaluation of ITSM tools.

© All rights reserved Jaferian et al. and/or ACM Press

2009
 
Edit | Del

Jaferian, Pooya, Botta, David, Hawkey, Kirstie and Beznosov, Konstantin (2009): A multi-method approach for user-centered design of identity management systems. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 36. Available online

 
Edit | Del

Jaferian, Pooya, Botta, David, Hawkey, Kirstie and Beznosov, Konstantin (2009): A case study of enterprise identity management system adoption in an insurance organization. In: Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology 2009. p. 7. Available online

This case study describes the adoption of an enterprise identity management (IdM) system in an insurance organization. We describe the state of the organization before deploying the IdM system, and point out the challenges in its IdM practices. We describe the organization's requirements for an IdM system, why a particular solution was chosen, issues in the deployment and configuration of the solution, the expected benefits, and the new challenges that arose from using the solution. Throughout, we identify practical problems that can be the focus of future research and development efforts. Our results confirm and elaborate upon the findings of previous research, contributing to an as-yet immature body of cases about IdM. Furthermore, our findings serve as a validation of our previously identified guidelines for IT security tools in general.

© All rights reserved Jaferian et al. and/or ACM Press

2008
 
Edit | Del

Werlinger, Rodrigo, Hawkey, Kirstie, Muldner, Kasia, Jaferian, Pooya and Beznosov, Konstantin (2008): The challenges of using an intrusion detection system: is it worth the effort?. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 107-118. Available online

An intrusion detection system (IDS) can be a key component of security incident response within organizations. Traditionally, intrusion detection research has focused on improving the accuracy of IDSs, but recent work has recognized the need to support the security practitioners who receive the IDS alarms and investigate suspected incidents. To examine the challenges associated with deploying and maintaining an IDS, we analyzed 9 interviews with IT security practitioners who have worked with IDSs and performed participatory observations in an organization deploying a network IDS. We had three main research questions: (1) What do security practitioners expect from an IDS?; (2) What difficulties do they encounter when installing and configuring an IDS?; and (3) How can the usability of an IDS be improved? Our analysis reveals both positive and negative perceptions that security practitioners have for IDSs, as well as several issues encountered during the initial stages of IDS deployment. In particular, practitioners found it difficult to decide where to place the IDS and how to best configure it for use within a distributed environment with multiple stakeholders. We provide recommendations for tool support to help mitigate these challenges and reduce the effort of introducing an IDS within an organization.

© All rights reserved Werlinger et al. and/or ACM Press

 
Edit | Del

Jaferian, Pooya, Botta, David, Raja, Fahimeh, Hawkey, Kirstie and Beznosov, Konstantin (2008): Guidelines for designing IT security management tools. In: Frisch, AEleen, Kandogan, Eser, Lutters, Wayne G., Thornton, James D. and Mouloua, Mustapha (eds.) CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology November 14-15, 2008, San Diego, California, USA. p. 7. Available online

 
Edit | Del

Jaferian, Pooya, Botta, David, Raja, Fahimeh, Hawkey, Kirstie and Beznosov, Konstantin (2008): Guidelines for designing IT security management tools. In: Proceedings of the 2008 Symposium on Computer Human Interaction for the Management of Information Technology 2008. p. 7. Available online

An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of design guidelines for such tools. We gathered guidelines and recommendations related to IT security management tools from the literature as well as from our own prior studies of IT security management. We categorized and combined these into a set of high level guidelines and identified the relationships between the guidelines and challenges in IT security management. We also illustrated the need for the guidelines, where possible, with quotes from additional interviews with five security practitioners. Our framework of guidelines can be used by those developing IT security tools, as well as by practitioners and managers evaluating tools.

© All rights reserved Jaferian et al. and/or ACM Press

 
Add publication
Show list on your website
 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/authors/pooya_jaferian.html