Evaluating security products based on appropriate usage | IEEE Conference Publication | IEEE Xplore