Purpose - This paper aims to use user-centred security development of a prototype graphical interface for a management information system dealing with information security with upper-level management as the intended users. Design/methodology/approach - The intended users were studied in order to understand their needs. An iterative design process was used where the designs were first made on paper, then as a prototype interface and later as a final interface design. All was tested by subjects within the target user group. Findings - The interface was perceived as being successful by the test subjects and the sponsoring organization, Siguru. The major conclusion of the study is that managers use knowledge of information security mainly for financial and strategic matters which focus more on risk issues than security issues. To facilitate the need of managers the study presents three heuristics for the design of management information security system interfaces. Research limitations/implications - This interface was tested on a limited set of users and further tests could be done, especially of users with other cultural/professional backgrounds. Practical implications - This paper presents a useful set of heuristics that can be used in development of management information systems as well as other practical tips for similar projects. Originality/value - This paper gives an example of a successful user-centred security development process. The lessons learned could be beneficial in software development in general and security products in particular.
[1]
H. Vos.
Trade and Industry
,
1946
.
[2]
Colin Potts,et al.
Design of Everyday Things
,
1988
.
[3]
J. D. Tygar,et al.
Usability of Security: A Case Study,
,
1998
.
[4]
Paul Dourish,et al.
Two experiences designing for effective security
,
2005,
SOUPS '05.
[5]
Jakob Nielsen,et al.
Heuristic Evaluation of Prototypes (individual)
,
2022
.
[6]
Rossouw von Solms,et al.
The 10 deadly sins of information security management
,
2004,
Comput. Secur..
[7]
Janice Redish,et al.
User and task analysis for interface design
,
1998
.
[8]
Paul Dourish,et al.
An approach to usable security based on event monitoring and visualization
,
2002,
NSPW '02.
[9]
Mary Ellen Zurko,et al.
User-centered security
,
1996,
NSPW '96.
[10]
Steven Furnell,et al.
Considering the Usability of End-User Security Software
,
2006,
SEC.