메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Guidelines for designing IT security management tools

Author keywords

Design; Human factors; Security management

Indexed keywords

DESIGN GUIDELINES; HUMAN FACTORS; IT SECURITY; SECURITY MANAGEMENT; SECURITY PRACTITIONERS;

EID: 70350697857     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1477973.1477983     Document Type: Conference Paper
Times cited : (29)

References (49)
  • 1
    • 33749520207 scopus 로고    scopus 로고
    • K. Abdullah, C. Lee, G. Conti, J. A. Copeland, and J. Stasko. IDS RainStorm: Visualizing ids alarms. In VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security, pages 1-10, Minneapolis, MN, USA, 2005. IEEE Computer Society.
    • K. Abdullah, C. Lee, G. Conti, J. A. Copeland, and J. Stasko. IDS RainStorm: Visualizing ids alarms. In VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security, pages 1-10, Minneapolis, MN, USA, 2005. IEEE Computer Society.
  • 3
    • 24344467457 scopus 로고    scopus 로고
    • C. Andrew. The ve ps of patch management: Is there a simple way for businesses to develop and deploy an advanced security patch management strategy? Computers & Security, 24(5):362-363, 8 2005.
    • C. Andrew. The ve ps of patch management: Is there a simple way for businesses to develop and deploy an advanced security patch management strategy? Computers & Security, 24(5):362-363, 8 2005.
  • 6
    • 25844510142 scopus 로고    scopus 로고
    • Usable autonomic computing systems: The system administratorsṕerspective
    • R. Barrett, P. P. Maglio, E. Kandogan, and J. Bailey. Usable autonomic computing systems: The system administratorsṕerspective. Advanced Engineering Informatics, 19(3):213-221, 2005.
    • (2005) Advanced Engineering Informatics , vol.19 , Issue.3 , pp. 213-221
    • Barrett, R.1    Maglio, P.P.2    Kandogan, E.3    Bailey, J.4
  • 7
    • 21644436956 scopus 로고    scopus 로고
    • Field Studies of Computer System Administrators: Analysis of System Management Tools and Practices
    • Chicago, IL, USA
    • R. Barrett, M. Prabaker, and L. Takayama. Field Studies of Computer System Administrators: Analysis of System Management Tools and Practices. In CSCW '04, pages 388-395, Chicago, IL, USA, 2004.
    • (2004) CSCW '04 , pp. 388-395
    • Barrett, R.1    Prabaker, M.2    Takayama, L.3
  • 8
    • 20344394933 scopus 로고    scopus 로고
    • IT security: The product vendor landscape
    • 20055
    • B. Beal. IT security: the product vendor landscape. Network Security, 2005(5):9-10, 5 2005.
    • (2005) Network Security , vol.9-10 , pp. 5
    • Beal, B.1
  • 10
    • 0141681228 scopus 로고    scopus 로고
    • Ecological interface design: A new approach for visualizing network management
    • C. M. Burns, J. Kuo, and S. Ng. Ecological interface design: a new approach for visualizing network management. Comput. Netw., 43(3):369-388, 2003.
    • (2003) Comput. Netw , vol.43 , Issue.3 , pp. 369-388
    • Burns, C.M.1    Kuo, J.2    Ng, S.3
  • 16
    • 0031275037 scopus 로고    scopus 로고
    • Organizational usability of digital libraries: Case study of legal research in civil and criminal courts
    • M. Elliott and R. Kling. Organizational usability of digital libraries: Case study of legal research in civil and criminal courts. American Society for Information Science, 4(11):1023-1035, 1997.
    • (1997) American Society for Information Science , vol.4 , Issue.11 , pp. 1023-1035
    • Elliott, M.1    Kling, R.2
  • 17
    • 84926031369 scopus 로고    scopus 로고
    • Identifying differences between security and other IT professionals: A qualitative analysis
    • Human Aspects of Information Security and Assurance, Plymouth, England, July 8-9
    • A. Gagné, K. Muldner, and K. Beznosov. Identifying differences between security and other IT professionals: a qualitative analysis. In HAISA'08: Human Aspects of Information Security and Assurance, pages 69-80, Plymouth, England, July 8-9 2008.
    • (2008) HAISA'08 , pp. 69-80
    • Gagné, A.1    Muldner, K.2    Beznosov, K.3
  • 18
    • 67650962431 scopus 로고    scopus 로고
    • Information security governance reporting
    • R. Garigue and M. Stefaniu. Information security governance reporting. EDPACS, 31(6):11-17, 2003.
    • (2003) EDPACS , vol.31 , Issue.6 , pp. 11-17
    • Garigue, R.1    Stefaniu, M.2
  • 19
    • 33645748618 scopus 로고    scopus 로고
    • Guidelines for cognitively efficient multimedia learning tools: Educational strategies, cognitive load, and interface design
    • T. Grunwald and C. Corsbie-Massay. Guidelines for cognitively efficient multimedia learning tools: educational strategies, cognitive load, and interface design. Academic medicine, 83(3):213-223, 2006.
    • (2006) Academic medicine , vol.83 , Issue.3 , pp. 213-223
    • Grunwald, T.1    Corsbie-Massay, C.2
  • 21
    • 12344285897 scopus 로고    scopus 로고
    • The value of persistence: A study of the creation, ordering and use of conversation archives by a knowledge worker
    • Washington, DC, USA, IEEE Computer Society
    • C. A. Halverson. The value of persistence: A study of the creation, ordering and use of conversation archives by a knowledge worker. In HICSS '04: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, pages 1-10, Washington, DC, USA, 2004. IEEE Computer Society.
    • (2004) HICSS '04: Proceedings of the 37th Annual Hawaii International Conference on System Sciences , pp. 1-10
    • Halverson, C.A.1
  • 23
    • 44449146478 scopus 로고    scopus 로고
    • Searching for the Right Fit: Balancing IT Security Model Trade-offs. Special Issue on Useful Computer Security
    • K. Hawkey, K. Muldner, and K. Beznosov. Searching for the Right Fit: Balancing IT Security Model Trade-offs. Special Issue on Useful Computer Security, IEEE Internet Computing, 12(3):22-30, 2008.
    • (2008) IEEE Internet Computing , vol.12 , Issue.3 , pp. 22-30
    • Hawkey, K.1    Muldner, K.2    Beznosov, K.3
  • 26
    • 35348877203 scopus 로고    scopus 로고
    • Security administration tools and practices
    • L. F. Cranor and S. Garnkel, editors, chapter 18, O'Reilly Media, Inc
    • E. Kandogan and E. M. Haber. Security administration tools and practices. In L. F. Cranor and S. Garnkel, editors, Security and Usability: Designing Secure Systems that People Can Use, chapter 18, pages 357-378. O'Reilly Media, Inc., 2005.
    • (2005) Security and Usability: Designing Secure Systems that People Can Use , pp. 357-378
    • Kandogan, E.1    Haber, E.M.2
  • 27
    • 34547320186 scopus 로고    scopus 로고
    • A knowledge architecture for it security
    • S. Kesh and P. Ratnasingam. A knowledge architecture for it security. Commun. ACM, 50(7):103-108, 2007.
    • (2007) Commun. ACM , vol.50 , Issue.7 , pp. 103-108
    • Kesh, S.1    Ratnasingam, P.2
  • 28
    • 70350636469 scopus 로고    scopus 로고
    • G. Killcrece, K.-P. Kossakowski, R. Rue e, and M. Zajicek. Organizational models for computer security incident response teams (CSIRTS). Technical Report CMU/SEI-2003-HB-001, 2003.
    • G. Killcrece, K.-P. Kossakowski, R. Rue e, and M. Zajicek. Organizational models for computer security incident response teams (CSIRTS). Technical Report CMU/SEI-2003-HB-001, 2003.
  • 31
    • 33750513188 scopus 로고    scopus 로고
    • Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
    • S. Kraemer and P. Carayon. Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists. Applied Ergonomics, 38:143-154, 2007.
    • (2007) Applied Ergonomics , vol.38 , pp. 143-154
    • Kraemer, S.1    Carayon, P.2
  • 33
    • 67649509987 scopus 로고    scopus 로고
    • An analysis of security threats and tools in SIP-based VoIP systems
    • Washington DC, USA, June
    • S. McGann and D. C. Sicker. An analysis of security threats and tools in SIP-based VoIP systems. In 2nd VoIP Security Workshop, pages 1-8, Washington DC, USA, June 2005.
    • (2005) 2nd VoIP Security Workshop , pp. 1-8
    • McGann, S.1    Sicker, D.C.2
  • 34
    • 0029233344 scopus 로고
    • Applying discount usability engineering
    • J. Nielsen. Applying discount usability engineering. IEEE Software, 12(1):98-100, 1995.
    • (1995) IEEE Software , vol.12 , Issue.1 , pp. 98-100
    • Nielsen, J.1
  • 35
    • 34948879255 scopus 로고    scopus 로고
    • User-centred security applied to the development of a management information system
    • M. Nohlberg and J. Backstrom. User-centred security applied to the development of a management information system. Information Management & Computer Security, 15(5):372-381, 2007.
    • (2007) Information Management & Computer Security , vol.15 , Issue.5 , pp. 372-381
    • Nohlberg, M.1    Backstrom, J.2
  • 39
    • 0004143172 scopus 로고
    • Guidelines for designing user interface software
    • Technical Report ESD-TR-86-278, The MITRE Corporation Bedford MA, August
    • S. L. Smith and J. N. Mosier. Guidelines for designing user interface software. Technical Report ESD-TR-86-278, The MITRE Corporation Bedford MA, August 1986.
    • (1986)
    • Smith, S.L.1    Mosier, J.N.2
  • 42
    • 0026891326 scopus 로고
    • Ecological interface design: Theoretical foundations. Systems, Man and Cybernetics
    • Jul/Aug
    • K. Vicente and J. Rasmussen. Ecological interface design: theoretical foundations. Systems, Man and Cybernetics, IEEE Transactions on, 22(4):589-606, Jul/Aug 1992.
    • (1992) IEEE Transactions on , vol.22 , Issue.4 , pp. 589-606
    • Vicente, K.1    Rasmussen, J.2
  • 43
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management
    • B. von Solms and R. von Solms. The 10 deadly sins of information security management. Computers security, 23(5):371, 2004.
    • (2004) Computers security , vol.23 , Issue.5 , pp. 371
    • von Solms, B.1    von Solms, R.2
  • 44
    • 64849114056 scopus 로고    scopus 로고
    • Human, Organizational and Technological Challenges of Implementing IT Security in Organizations
    • Human Aspects of Information Security and Assurance, Plymouth, England, July 8-9
    • R. Werlinger, K. Hawkey, and K. Beznosov. Human, Organizational and Technological Challenges of Implementing IT Security in Organizations. In HAISA'08: Human Aspects of Information Security and Assurance, pages 35-48, Plymouth, England, July 8-9 2008.
    • (2008) HAISA'08 , pp. 35-48
    • Werlinger, R.1    Hawkey, K.2    Beznosov, K.3
  • 49
    • 33846645541 scopus 로고    scopus 로고
    • If you can't beat 'em, join 'em: Combining text and visual interfaces for security-system administration
    • W. Yurcik, R. S. Thompson, M. B. Twidale, and E. M. Rantanen. If you can't beat 'em, join 'em: combining text and visual interfaces for security-system administration. Interactions, 14(1):12-14, 2007.
    • (2007) Interactions , vol.14 , Issue.1 , pp. 12-14
    • Yurcik, W.1    Thompson, R.S.2    Twidale, M.B.3    Rantanen, E.M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.