-
1
-
-
33749520207
-
-
K. Abdullah, C. Lee, G. Conti, J. A. Copeland, and J. Stasko. IDS RainStorm: Visualizing ids alarms. In VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security, pages 1-10, Minneapolis, MN, USA, 2005. IEEE Computer Society.
-
K. Abdullah, C. Lee, G. Conti, J. A. Copeland, and J. Stasko. IDS RainStorm: Visualizing ids alarms. In VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security, pages 1-10, Minneapolis, MN, USA, 2005. IEEE Computer Society.
-
-
-
-
3
-
-
24344467457
-
-
C. Andrew. The ve ps of patch management: Is there a simple way for businesses to develop and deploy an advanced security patch management strategy? Computers & Security, 24(5):362-363, 8 2005.
-
C. Andrew. The ve ps of patch management: Is there a simple way for businesses to develop and deploy an advanced security patch management strategy? Computers & Security, 24(5):362-363, 8 2005.
-
-
-
-
4
-
-
0033644990
-
Guidelines for using multiple views in information
-
Palermo, Italy, ACM
-
M. Q. W. Baldonado, A. Woodruff, and A. Kuchinsky. Guidelines for using multiple views in information. In AVI '00: Proceedings of the working conference on Advanced visual interfaces, pages 110-119, Palermo, Italy, 2000. ACM.
-
(2000)
AVI '00: Proceedings of the working conference on Advanced visual interfaces
, pp. 110-119
-
-
Baldonado, M.Q.W.1
Woodruff, A.2
Kuchinsky, A.3
-
5
-
-
20444447760
-
Home-centric visualization of network traffic for security administration
-
Fairfax, VA, USA, ACM
-
R. Ball, G. A. Fink, and C. North. Home-centric visualization of network traffic for security administration. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 55-64, Fairfax, VA, USA, 2004. ACM.
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 55-64
-
-
Ball, R.1
Fink, G.A.2
North, C.3
-
6
-
-
25844510142
-
Usable autonomic computing systems: The system administratorsṕerspective
-
R. Barrett, P. P. Maglio, E. Kandogan, and J. Bailey. Usable autonomic computing systems: The system administratorsṕerspective. Advanced Engineering Informatics, 19(3):213-221, 2005.
-
(2005)
Advanced Engineering Informatics
, vol.19
, Issue.3
, pp. 213-221
-
-
Barrett, R.1
Maglio, P.P.2
Kandogan, E.3
Bailey, J.4
-
7
-
-
21644436956
-
Field Studies of Computer System Administrators: Analysis of System Management Tools and Practices
-
Chicago, IL, USA
-
R. Barrett, M. Prabaker, and L. Takayama. Field Studies of Computer System Administrators: Analysis of System Management Tools and Practices. In CSCW '04, pages 388-395, Chicago, IL, USA, 2004.
-
(2004)
CSCW '04
, pp. 388-395
-
-
Barrett, R.1
Prabaker, M.2
Takayama, L.3
-
8
-
-
20344394933
-
IT security: The product vendor landscape
-
20055
-
B. Beal. IT security: the product vendor landscape. Network Security, 2005(5):9-10, 5 2005.
-
(2005)
Network Security
, vol.9-10
, pp. 5
-
-
Beal, B.1
-
9
-
-
36849085382
-
Towards understanding IT security professionals and their tools
-
Pittsburgh, Pennsylvania, July 18-20, ACM
-
D. Botta, R. Werlinger, A. Gagné, K. Beznosov, L. Iverson, S. Fels, and B. Fisher. Towards understanding IT security professionals and their tools. In SOUPS '07: Proceedings of the 2007 Symposium On Usable Privacy and Security, pages 100-111, Pittsburgh, Pennsylvania, July 18-20 2007. ACM.
-
(2007)
SOUPS '07: Proceedings of the 2007 Symposium On Usable Privacy and Security
, pp. 100-111
-
-
Botta, D.1
Werlinger, R.2
Gagné, A.3
Beznosov, K.4
Iverson, L.5
Fels, S.6
Fisher, B.7
-
10
-
-
0141681228
-
Ecological interface design: A new approach for visualizing network management
-
C. M. Burns, J. Kuo, and S. Ng. Ecological interface design: a new approach for visualizing network management. Comput. Netw., 43(3):369-388, 2003.
-
(2003)
Comput. Netw
, vol.43
, Issue.3
, pp. 369-388
-
-
Burns, C.M.1
Kuo, J.2
Ng, S.3
-
12
-
-
70350656930
-
Even experts deserve usable security: Design guidelines for security management systems
-
Pittsburgh, PA, July
-
S. Chiasson, P. C. van Oorschot, and R. Biddle. Even experts deserve usable security: Design guidelines for security management systems. In SOUPS Workshop on Usable IT Security Management (USM), Pittsburgh, PA, July 2007.
-
(2007)
SOUPS Workshop on Usable IT Security Management (USM)
-
-
Chiasson, S.1
van Oorschot, P.C.2
Biddle, R.3
-
16
-
-
0031275037
-
Organizational usability of digital libraries: Case study of legal research in civil and criminal courts
-
M. Elliott and R. Kling. Organizational usability of digital libraries: Case study of legal research in civil and criminal courts. American Society for Information Science, 4(11):1023-1035, 1997.
-
(1997)
American Society for Information Science
, vol.4
, Issue.11
, pp. 1023-1035
-
-
Elliott, M.1
Kling, R.2
-
17
-
-
84926031369
-
Identifying differences between security and other IT professionals: A qualitative analysis
-
Human Aspects of Information Security and Assurance, Plymouth, England, July 8-9
-
A. Gagné, K. Muldner, and K. Beznosov. Identifying differences between security and other IT professionals: a qualitative analysis. In HAISA'08: Human Aspects of Information Security and Assurance, pages 69-80, Plymouth, England, July 8-9 2008.
-
(2008)
HAISA'08
, pp. 69-80
-
-
Gagné, A.1
Muldner, K.2
Beznosov, K.3
-
18
-
-
67650962431
-
Information security governance reporting
-
R. Garigue and M. Stefaniu. Information security governance reporting. EDPACS, 31(6):11-17, 2003.
-
(2003)
EDPACS
, vol.31
, Issue.6
, pp. 11-17
-
-
Garigue, R.1
Stefaniu, M.2
-
19
-
-
33645748618
-
Guidelines for cognitively efficient multimedia learning tools: Educational strategies, cognitive load, and interface design
-
T. Grunwald and C. Corsbie-Massay. Guidelines for cognitively efficient multimedia learning tools: educational strategies, cognitive load, and interface design. Academic medicine, 83(3):213-223, 2006.
-
(2006)
Academic medicine
, vol.83
, Issue.3
, pp. 213-223
-
-
Grunwald, T.1
Corsbie-Massay, C.2
-
21
-
-
12344285897
-
The value of persistence: A study of the creation, ordering and use of conversation archives by a knowledge worker
-
Washington, DC, USA, IEEE Computer Society
-
C. A. Halverson. The value of persistence: A study of the creation, ordering and use of conversation archives by a knowledge worker. In HICSS '04: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, pages 1-10, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
HICSS '04: Proceedings of the 37th Annual Hawaii International Conference on System Sciences
, pp. 1-10
-
-
Halverson, C.A.1
-
22
-
-
57049127094
-
Human, Organizational, and Technological Factors of IT Security
-
Florence, Italy
-
K. Hawkey, D. Botta, R. Werlinger, K. Muldner, A. Gagne, and K. Beznosov. Human, Organizational, and Technological Factors of IT Security. In CHI'08 extended abstract on Human factors in computing systems, pages 3639-3644, Florence, Italy, 2008.
-
(2008)
CHI'08 extended abstract on Human factors in computing systems
, pp. 3639-3644
-
-
Hawkey, K.1
Botta, D.2
Werlinger, R.3
Muldner, K.4
Gagne, A.5
Beznosov, K.6
-
23
-
-
44449146478
-
Searching for the Right Fit: Balancing IT Security Model Trade-offs. Special Issue on Useful Computer Security
-
K. Hawkey, K. Muldner, and K. Beznosov. Searching for the Right Fit: Balancing IT Security Model Trade-offs. Special Issue on Useful Computer Security, IEEE Internet Computing, 12(3):22-30, 2008.
-
(2008)
IEEE Internet Computing
, vol.12
, Issue.3
, pp. 22-30
-
-
Hawkey, K.1
Muldner, K.2
Beznosov, K.3
-
25
-
-
0035040276
-
Reading of electronic documents: The usability of linear, sheye, and overview+detail interfaces
-
New York, NY, USA, ACM
-
K. Hornbaek and E. Frokjaer. Reading of electronic documents: the usability of linear, sheye, and overview+detail interfaces. In CHI '01: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 293-300, New York, NY, USA, 2001. ACM.
-
(2001)
CHI '01: Proceedings of the SIGCHI conference on Human factors in computing systems
, pp. 293-300
-
-
Hornbaek, K.1
Frokjaer, E.2
-
26
-
-
35348877203
-
Security administration tools and practices
-
L. F. Cranor and S. Garnkel, editors, chapter 18, O'Reilly Media, Inc
-
E. Kandogan and E. M. Haber. Security administration tools and practices. In L. F. Cranor and S. Garnkel, editors, Security and Usability: Designing Secure Systems that People Can Use, chapter 18, pages 357-378. O'Reilly Media, Inc., 2005.
-
(2005)
Security and Usability: Designing Secure Systems that People Can Use
, pp. 357-378
-
-
Kandogan, E.1
Haber, E.M.2
-
27
-
-
34547320186
-
A knowledge architecture for it security
-
S. Kesh and P. Ratnasingam. A knowledge architecture for it security. Commun. ACM, 50(7):103-108, 2007.
-
(2007)
Commun. ACM
, vol.50
, Issue.7
, pp. 103-108
-
-
Kesh, S.1
Ratnasingam, P.2
-
28
-
-
70350636469
-
-
G. Killcrece, K.-P. Kossakowski, R. Rue e, and M. Zajicek. Organizational models for computer security incident response teams (CSIRTS). Technical Report CMU/SEI-2003-HB-001, 2003.
-
G. Killcrece, K.-P. Kossakowski, R. Rue e, and M. Zajicek. Organizational models for computer security incident response teams (CSIRTS). Technical Report CMU/SEI-2003-HB-001, 2003.
-
-
-
-
29
-
-
33749533756
-
A user-centered look at glyph-based security visualization
-
Minneapolis, MN, USA
-
A. Komlod, P. Rheingans, U. Ayachit, J. Goodall, and A. Joshi. A user-centered look at glyph-based security visualization. In VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security, pages 21-28, Minneapolis, MN, USA, 2005.
-
(2005)
VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security
, pp. 21-28
-
-
Komlod, A.1
Rheingans, P.2
Ayachit, U.3
Goodall, J.4
Joshi, A.5
-
31
-
-
33750513188
-
Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
-
S. Kraemer and P. Carayon. Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists. Applied Ergonomics, 38:143-154, 2007.
-
(2007)
Applied Ergonomics
, vol.38
, pp. 143-154
-
-
Kraemer, S.1
Carayon, P.2
-
32
-
-
34547359962
-
Flowtag: A collaborative attack-analysis, reporting, and sharing tool for security researchers
-
Alexandria, VA, USA, ACM
-
C. P. Lee and J. A. Copeland. Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers. In VizSEC '06: Proceedings of the 3rd international workshop on Visualization for computer security, pages 103-108, Alexandria, VA, USA, 2006. ACM.
-
(2006)
VizSEC '06: Proceedings of the 3rd international workshop on Visualization for computer security
, pp. 103-108
-
-
Lee, C.P.1
Copeland, J.A.2
-
33
-
-
67649509987
-
An analysis of security threats and tools in SIP-based VoIP systems
-
Washington DC, USA, June
-
S. McGann and D. C. Sicker. An analysis of security threats and tools in SIP-based VoIP systems. In 2nd VoIP Security Workshop, pages 1-8, Washington DC, USA, June 2005.
-
(2005)
2nd VoIP Security Workshop
, pp. 1-8
-
-
McGann, S.1
Sicker, D.C.2
-
34
-
-
0029233344
-
Applying discount usability engineering
-
J. Nielsen. Applying discount usability engineering. IEEE Software, 12(1):98-100, 1995.
-
(1995)
IEEE Software
, vol.12
, Issue.1
, pp. 98-100
-
-
Nielsen, J.1
-
35
-
-
34948879255
-
User-centred security applied to the development of a management information system
-
M. Nohlberg and J. Backstrom. User-centred security applied to the development of a management information system. Information Management & Computer Security, 15(5):372-381, 2007.
-
(2007)
Information Management & Computer Security
, vol.15
, Issue.5
, pp. 372-381
-
-
Nohlberg, M.1
Backstrom, J.2
-
37
-
-
0026995443
-
Ghosts in the network: Distributed troubleshooting in a shared working environment
-
Toronto, ON, Canada, ACM
-
Y. Rogers. Ghosts in the network: distributed troubleshooting in a shared working environment. In CSCW '92: Proceedings of the 1992 ACM conference on Computer-supported cooperative work, pages 346-355, Toronto, ON, Canada, 1992. ACM.
-
(1992)
CSCW '92: Proceedings of the 1992 ACM conference on Computer-supported cooperative work
, pp. 346-355
-
-
Rogers, Y.1
-
38
-
-
9944223063
-
System guidelines for co-located, collaborative work on a tabletop display
-
Norwell, MA, USA, Kluwer Academic Publishers
-
S. D. Scott, K. D. Grant, and R. L. Mandryk. System guidelines for co-located, collaborative work on a tabletop display. In ECSCW'03: Proceedings of the eighth European Conference on Computer Supported Cooperative Work, pages 159-178, Norwell, MA, USA, 2003. Kluwer Academic Publishers.
-
(2003)
ECSCW'03: Proceedings of the eighth European Conference on Computer Supported Cooperative Work
, pp. 159-178
-
-
Scott, S.D.1
Grant, K.D.2
Mandryk, R.L.3
-
39
-
-
0004143172
-
Guidelines for designing user interface software
-
Technical Report ESD-TR-86-278, The MITRE Corporation Bedford MA, August
-
S. L. Smith and J. N. Mosier. Guidelines for designing user interface software. Technical Report ESD-TR-86-278, The MITRE Corporation Bedford MA, August 1986.
-
(1986)
-
-
Smith, S.L.1
Mosier, J.N.2
-
40
-
-
35048878883
-
Design guidelines and user-centred digital libraries
-
London, UK, Springer-Verlag
-
Y. L. Theng, E. Duncker, N. Mohd-Nasir, G. Buchanan, and H. W. Thimbleby. Design guidelines and user-centred digital libraries. In ECDL '99: Proceedings of the Third European Conference on Research and Advanced Technology for Digital Libraries, pages 167-183, London, UK, 1999. Springer-Verlag.
-
(1999)
ECDL '99: Proceedings of the Third European Conference on Research and Advanced Technology for Digital Libraries
, pp. 167-183
-
-
Theng, Y.L.1
Duncker, E.2
Mohd-Nasir, N.3
Buchanan, G.4
Thimbleby, H.W.5
-
41
-
-
35348897951
-
Command line or pretty lines?: Comparing textual and visual interfaces for intrusion detection
-
San Jose, California, USA, ACM
-
R. S. Thompson, E. M. Rantanen, W. Yurcik, and B. P. Bailey. Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection. In CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 1205-1214, San Jose, California, USA, 2007. ACM.
-
(2007)
CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems
, pp. 1205-1214
-
-
Thompson, R.S.1
Rantanen, E.M.2
Yurcik, W.3
Bailey, B.P.4
-
42
-
-
0026891326
-
Ecological interface design: Theoretical foundations. Systems, Man and Cybernetics
-
Jul/Aug
-
K. Vicente and J. Rasmussen. Ecological interface design: theoretical foundations. Systems, Man and Cybernetics, IEEE Transactions on, 22(4):589-606, Jul/Aug 1992.
-
(1992)
IEEE Transactions on
, vol.22
, Issue.4
, pp. 589-606
-
-
Vicente, K.1
Rasmussen, J.2
-
43
-
-
3042812983
-
The 10 deadly sins of information security management
-
B. von Solms and R. von Solms. The 10 deadly sins of information security management. Computers security, 23(5):371, 2004.
-
(2004)
Computers security
, vol.23
, Issue.5
, pp. 371
-
-
von Solms, B.1
von Solms, R.2
-
44
-
-
64849114056
-
Human, Organizational and Technological Challenges of Implementing IT Security in Organizations
-
Human Aspects of Information Security and Assurance, Plymouth, England, July 8-9
-
R. Werlinger, K. Hawkey, and K. Beznosov. Human, Organizational and Technological Challenges of Implementing IT Security in Organizations. In HAISA'08: Human Aspects of Information Security and Assurance, pages 35-48, Plymouth, England, July 8-9 2008.
-
(2008)
HAISA'08
, pp. 35-48
-
-
Werlinger, R.1
Hawkey, K.2
Beznosov, K.3
-
45
-
-
57049153457
-
Security practitioners in context: Their activities and interactions
-
Florence, Italy
-
R. Werlinger, K. Hawkey, and K. Beznosov. Security practitioners in context: their activities and interactions. In CHI '08 extended abstracts on Human factors in computing systems, pages 3789-3794, Florence, Italy, 2008.
-
(2008)
CHI '08 extended abstracts on Human factors in computing systems
, pp. 3789-3794
-
-
Werlinger, R.1
Hawkey, K.2
Beznosov, K.3
-
46
-
-
64849099080
-
The challenges of using an intrusion detection system: Is it worth the effort?
-
Pittsburgh, Pennsylvania, July 23-25
-
R. Werlinger, K. Hawkey, K. Muldner, P. Jaferian, and K. Beznosov. The challenges of using an intrusion detection system: Is it worth the effort? In SOUPS '08: Proceedings of the 2008 Symposium On Usable Privacy and Security, pages 107-116, Pittsburgh, Pennsylvania, July 23-25 2008.
-
(2008)
SOUPS '08: Proceedings of the 2008 Symposium On Usable Privacy and Security
, pp. 107-116
-
-
Werlinger, R.1
Hawkey, K.2
Muldner, K.3
Jaferian, P.4
Beznosov, K.5
-
47
-
-
77949519478
-
Midweight collaborative remembering: Wikis in the workplace
-
Cambridge, MA, USA, ACM
-
K. F. White and W. G. Lutters. Midweight collaborative remembering: wikis in the workplace. In CHIMIT '07: Proceedings of the 2007 symposium on Computer Human Interaction for the Management of Information Technology, pages 111-112, Cambridge, MA, USA, 2007. ACM.
-
(2007)
CHIMIT '07: Proceedings of the 2007 symposium on Computer Human Interaction for the Management of Information Technology
, pp. 111-112
-
-
White, K.F.1
Lutters, W.G.2
-
49
-
-
33846645541
-
If you can't beat 'em, join 'em: Combining text and visual interfaces for security-system administration
-
W. Yurcik, R. S. Thompson, M. B. Twidale, and E. M. Rantanen. If you can't beat 'em, join 'em: combining text and visual interfaces for security-system administration. Interactions, 14(1):12-14, 2007.
-
(2007)
Interactions
, vol.14
, Issue.1
, pp. 12-14
-
-
Yurcik, W.1
Thompson, R.S.2
Twidale, M.B.3
Rantanen, E.M.4
|