메뉴 건너뛰기




Volumn 229, Issue , 2007, Pages 100-111

Towards understanding IT security professionals and their tools

Author keywords

Collaboration; Ethnography; Security management; Security tasks; Security tools; Usable security

Indexed keywords

INFORMATION TECHNOLOGY; PATTERN RECOGNITION; PERSONNEL; SOCIETIES AND INSTITUTIONS;

EID: 36849085382     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1280680.1280693     Document Type: Conference Paper
Times cited : (84)

References (26)
  • 3
    • 36849083639 scopus 로고    scopus 로고
    • A. Bartels, B. J. Holmes, and H. Lo. Global IT spending and investment forecast, 2006 to 2007. Forrester Research, 2006.
    • A. Bartels, B. J. Holmes, and H. Lo. Global IT spending and investment forecast, 2006 to 2007. Forrester Research, 2006.
  • 5
    • 36849015982 scopus 로고
    • Human activity and humain-computer interaction
    • S. Bodker, editor, Lawrence Erlbaum Associates, Publishers, Hillsdale, NJ
    • S. Bodker. Human activity and humain-computer interaction. In S. Bodker, editor, Through the Interface: A Human Activity Approach to User Interface Design, pages 18-56. Lawrence Erlbaum Associates, Publishers, Hillsdale, NJ, 1991.
    • (1991) Through the Interface: A Human Activity Approach to User Interface Design , pp. 18-56
    • Bodker, S.1
  • 6
    • 1842653460 scopus 로고    scopus 로고
    • Cambridge University Press, Cambridge, England
    • H. H. Clark. Using Language. Cambridge University Press, Cambridge, England, 1996.
    • (1996) Using Language
    • Clark, H.H.1
  • 8
    • 0031275037 scopus 로고    scopus 로고
    • Organizational usability of digital libraries: Case study of legal research in civil and criminal courts
    • M. Elliott and R. Kling. Organizational usability of digital libraries: Case study of legal research in civil and criminal courts. American Society for Information Science., 4(11):1023-1035, 1997.
    • (1997) American Society for Information Science , vol.4 , Issue.11 , pp. 1023-1035
    • Elliott, M.1    Kling, R.2
  • 13
    • 36849063889 scopus 로고    scopus 로고
    • Internet relay chat (irc) help archive, February
    • Internet relay chat (irc) help archive. http://www.irchelp.org/, February 2007.
    • (2007)
  • 14
    • 35348877203 scopus 로고    scopus 로고
    • Security administration tools and practices
    • L. F. Cranor and S. Garfinkel, editors, chapter 18, O'Reilly Media, Inc, Sebastapol
    • E. Kandogan and E. M. Haber. Security administration tools and practices. In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use, chapter 18, pages 357-378. O'Reilly Media, Inc., Sebastapol, 2005.
    • (2005) Security and Usability: Designing Secure Systems that People Can Use , pp. 357-378
    • Kandogan, E.1    Haber, E.M.2
  • 17
    • 33749254018 scopus 로고    scopus 로고
    • Two design principles for collaboration technology: Examples of semiformal systems and radical tailorability
    • T. Malone, K. Lai, and K. Grant. Two design principles for collaboration technology: Examples of semiformal systems and radical tailorability. Coordination Theory and Collaboration Technology, pages 125-160, 2001.
    • (2001) Coordination Theory and Collaboration Technology , pp. 125-160
    • Malone, T.1    Lai, K.2    Grant, K.3
  • 19
  • 21
    • 36849001988 scopus 로고    scopus 로고
    • February
    • Idea works: Qualrus software. http://www.ideaworks.com/qualrus/index. html, February 2007.
    • (2007) Qualrus software
    • Idea works1
  • 22
    • 36849068520 scopus 로고    scopus 로고
    • K. J. . Vicente. Cognitive Work Analysis: Toward Safe, Productive, and Healthy Computer-Based Work. Mahwah, NJ: Lawrence Erlbaum Associates, Publishers, 1999.
    • K. J. . Vicente. Cognitive Work Analysis: Toward Safe, Productive, and Healthy Computer-Based Work. Mahwah, NJ: Lawrence Erlbaum Associates, Publishers, 1999.
  • 23
    • 3042617182 scopus 로고    scopus 로고
    • A quantitative study of firewall configuration errors
    • A. Wool. A quantitative study of firewall configuration errors. Computer, 37(6):62- 67, 2004.
    • (2004) Computer , vol.37 , Issue.6 , pp. 62-67
    • Wool, A.1
  • 25
    • 0032629460 scopus 로고    scopus 로고
    • A user-centered, modular authorization service built on an RBAC foundation
    • Oakland, CA, USA
    • M. Zurko, R. Simon, and T. Sanfilippo. A user-centered, modular authorization service built on an RBAC foundation. In IEEE Symposium on Security and Privacy, pages 57-71, Oakland, CA , USA, 1999.
    • (1999) IEEE Symposium on Security and Privacy , pp. 57-71
    • Zurko, M.1    Simon, R.2    Sanfilippo, T.3
  • 26
    • 84926001904 scopus 로고    scopus 로고
    • User-centered security
    • Lake Arrowhead, California, ACM Press
    • M. E. Zurko and R. T. Simon. User-centered security. In New Security Paradigms Workshop, pages 27-33, Lake Arrowhead, California, 1996. ACM Press.
    • (1996) New Security Paradigms Workshop , pp. 27-33
    • Zurko, M.E.1    Simon, R.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.