Home > Technical Reports > Understanding IT Security Administration through a Field Study > Keywords |
<record>
<controlfield tag="001">131</controlfield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">hot admin</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">field study</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Security Management</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Ethnography</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Security Tasks</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Security Tools</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Usable Security</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Collaboration</subfield>
</datafield>
</record>