000000143 001__ 143
000000143 005__ 20130522141942.0
000000143 037__ $$aLERSSE-RefConfPaper-2008-025
000000143 041__ $$aeng
000000143 100__ $$aRodrigo Werlinger
000000143 100__ $$aKirstie Hawkey
000000143 100__ $$aKonstantin Beznosov
000000143 245__ $$aSecurity Practitioners in Context: Their Activities and Interactions 
000000143 260__ $$c2007-06-13
000000143 520__ $$aThis study develops the context of interactions of IT security practitioners. Preliminary qualitative analysis of 22 interviews (to date) and participatory observation has identified eight different types of activities that require interactions between security practitioners and different stakeholders. Our analysis shows that the tools used by our participants do not provide sufficient support for their complex security tasks, including the interactions with other stakeholders. We provide recommendations to improve tool support for security practitioners. 
000000143 6531_ $$aHOT Admin
000000143 6531_ $$aSecurity Tools
000000143 6531_ $$aUsable Security
000000143 6531_ $$aQualitative Analysis
000000143 8560_ $$frodrigow@ece.ubc.ca
000000143 8564_ $$uhttp://lersse-dl.ece.ubc.ca/record/143/files/143.pdf$$yTransfer from CDS 0.99.7
000000143 909C4 $$pRodrigo Werlinger, Kirstie Hawkey, and Konstantin Beznosov. Security practitioners in context: their activities and interactions. In CHI ’08 extended abstracts on Human factors in computing systems, pages 3789–3794, Florence, Italy, 2008. 


000000143 980__ $$aRefConfPaper