-
1
-
-
36849085382
-
Towards Understanding IT Security Professionals and Their Tools
-
Botta, D., Werlinger, R., Gagne, A., Beznosov, K., Iverson, L., Fels, S., and Fisher, B. Towards Understanding IT Security Professionals and Their Tools. Proc. of Symposium on Usable Privacy and Security (SOUPS). ACM. (2007). 100-111.
-
(2007)
Proc. of Symposium on Usable Privacy and Security (SOUPS). ACM
, pp. 100-111
-
-
Botta, D.1
Werlinger, R.2
Gagne, A.3
Beznosov, K.4
Iverson, L.5
Fels, S.6
Fisher, B.7
-
2
-
-
0035341601
-
Error and distributed cognition in design
-
Busby, J.S., Error and distributed cognition in design. Design Studies, (2001). 22: 233-254.
-
(2001)
Design Studies
, vol.22
, pp. 233-254
-
-
Busby, J.S.1
-
3
-
-
59649086633
-
-
Flechais, I. and Sasse, M.A., Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science. Int. J. Human-Computer Studies, (2007): doi:10.1016/j.ijhcs.2007.10.002.
-
Flechais, I. and Sasse, M.A., Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science. Int. J. Human-Computer Studies, (2007): doi:10.1016/j.ijhcs.2007.10.002.
-
-
-
-
5
-
-
35348877203
-
Security administration tools and practices
-
L. F. Cranor and Garfinkel, S, Editors, O'Reilly Media, Inc, Sebastapol
-
Kandogan, E. and Haber, E.M., Security administration tools and practices., in Security and Usability: Designing Secure Systems that People Can Use, L. F. Cranor and Garfinkel, S., Editors. 2005, O'Reilly Media, Inc.: Sebastapol. 357-378.
-
(2005)
Security and Usability: Designing Secure Systems that People Can Use
, pp. 357-378
-
-
Kandogan, E.1
Haber, E.M.2
-
6
-
-
0037400028
-
An integrative study of information systems security effectiveness
-
Kankanhalli, A., Teo, H.-H., Tan, B.C.Y., and Wei, K.-K., An integrative study of information systems security effectiveness. Int. J. Information Management, (2003). 23(2): 139-154.
-
(2003)
Int. J. Information Management
, vol.23
, Issue.2
, pp. 139-154
-
-
Kankanhalli, A.1
Teo, H.-H.2
Tan, B.C.Y.3
Wei, K.-K.4
-
7
-
-
57049154398
-
-
Killcrece, G., Kossakowski, K.P., Ruefle, R., and Zajicek, M., Organizational models for computer security incident response teams (CSIRTS). (2003): CMU/SEI-2003-HB-001 ADA421684: http://www.sei.cmu.edu/ publications/documents/03.reports/03hb001.html.
-
Killcrece, G., Kossakowski, K.P., Ruefle, R., and Zajicek, M., Organizational models for computer security incident response teams (CSIRTS). (2003): CMU/SEI-2003-HB-001 ADA421684: http://www.sei.cmu.edu/ publications/documents/03.reports/03hb001.html.
-
-
-
-
8
-
-
57049183421
-
-
Killcrece, G., Kossakowski, K.P., Ruefle, R., and Zajicek, M., Incident Management. (2005): buildsecurityin.us-cert.gov/daisy/bsl/ articles/best-practices/incident/223.html.
-
(2005)
Incident Management
-
-
Killcrece, G.1
Kossakowski, K.P.2
Ruefle, R.3
Zajicek, M.4
-
9
-
-
57049180578
-
-
Knapp, K.J., Marshall, T.E., Rainer, R.K., and Ford, F.N., Managerial dimensions in information security: A theoretical model of organizational effectiveness. (2005): www.isc2.org/download/auburnstudy2005.pdf.
-
(2005)
Managerial dimensions in information security: A theoretical model of organizational effectiveness
-
-
Knapp, K.J.1
Marshall, T.E.2
Rainer, R.K.3
Ford, F.N.4
-
10
-
-
1242263532
-
Why there aren't more information security research studies
-
Kotulic, A.G. and Clark, J.G., Why there aren't more information security research studies. Information & Management, (2004). 41(5): 597-607.
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
11
-
-
0036532101
-
An empirical study of industrial security-engineering practices
-
Rayford, R.H., B. Vaughn, J., and Fox, K., An empirical study of industrial security-engineering practices. J. of Systems and Software, (2001). 61: 225-232.
-
(2001)
J. of Systems and Software
, vol.61
, pp. 225-232
-
-
Rayford, R.H.B.1
Vaughn, J.2
Fox, K.3
-
12
-
-
57049138079
-
-
Redish, J., Expanding usability testing to evaluate complex systems. J. Of Usability Studies, (2007). 2(3): 102-111.
-
Redish, J., Expanding usability testing to evaluate complex systems. J. Of Usability Studies, (2007). 2(3): 102-111.
-
-
-
-
13
-
-
33646685242
-
IT Security: Protecting Organizations in Spite of Themselves
-
Siegel, D.A., Reid, B., and Dray, S.M., IT Security: Protecting Organizations in Spite of Themselves. Interactions, (2006). 13(3): 20-27.
-
(2006)
Interactions
, vol.13
, Issue.3
, pp. 20-27
-
-
Siegel, D.A.1
Reid, B.2
Dray, S.M.3
-
14
-
-
57049161260
-
Detecting, analyzing, and responding to security incidents: A qualitative analysis
-
Werlinger, R. and Botta, D. Detecting, analyzing, and responding to security incidents: A qualitative analysis. Proc. of Workshop on Usable IT Security Management (USM), SOUPS 2007. (2007).
-
(2007)
Proc. of Workshop on Usable IT Security Management (USM), SOUPS
-
-
Werlinger, R.1
Botta, D.2
-
15
-
-
57049119995
-
-
Werlinger, R., Hawkey, K., and Beznosov, K. Security Practitioners in Context: Their Activities and Interactions. Proc. of Ext. Abstracts of CHI 2008. ACM. (In press).
-
Werlinger, R., Hawkey, K., and Beznosov, K. Security Practitioners in Context: Their Activities and Interactions. Proc. of Ext. Abstracts of CHI 2008. ACM. (In press).
-
-
-
|