Home > Refereed Conference Papers > Studying IT Security Professionals: Research Design and Lessons Learned > Keywords |
<record>
<controlfield tag="001">126</controlfield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">usable security</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">HOT Admin</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">usable security administration</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Field Study</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">CHIMIT</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">management of information technology</subfield>
</datafield>
</record>