Security Practitioners in Context: Their Activities and Interactions

Rodrigo Werlinger ; Kirstie Hawkey ; Konstantin Beznosov

13 June 2007

Abstract: This study develops the context of interactions of IT security practitioners. Preliminary qualitative analysis of 22 interviews (to date) and participatory observation has identified eight different types of activities that require interactions between security practitioners and different stakeholders. Our analysis shows that the tools used by our participants do not provide sufficient support for their complex security tasks, including the interactions with other stakeholders. We provide recommendations to improve tool support for security practitioners.

Keyword(s): HOT Admin ; Security Tools ; Usable Security ; Qualitative Analysis

Published in: Rodrigo Werlinger, Kirstie Hawkey, and Konstantin Beznosov. Security practitioners in context: their activities and interactions. In CHI ’08 extended abstracts on Human factors in computing systems, pages 3789–3794, Florence, Italy, 2008. :

The record appears in these collections:
Refereed Conference Papers
Usable Security

 Record created 2009-04-27, last modified 2013-05-22

Transfer from CDS 0.99.7:
Download fulltext

Rate this document:

Rate this document:
(Not yet reviewed)