Home > Refereed Conference Papers > Security Practitioners in Context: Their Activities and Interactions |
LERSSE-RefConfPaper-2008-025 |
Rodrigo Werlinger ; Kirstie Hawkey ; Konstantin Beznosov
13 June 2007
Abstract: This study develops the context of interactions of IT security practitioners. Preliminary qualitative analysis of 22 interviews (to date) and participatory observation has identified eight different types of activities that require interactions between security practitioners and different stakeholders. Our analysis shows that the tools used by our participants do not provide sufficient support for their complex security tasks, including the interactions with other stakeholders. We provide recommendations to improve tool support for security practitioners.
Keyword(s): HOT Admin ; Security Tools ; Usable Security ; Qualitative Analysis
Published in: Rodrigo Werlinger, Kirstie Hawkey, and Konstantin Beznosov. Security practitioners in context: their activities and interactions. In CHI ’08 extended abstracts on Human factors in computing systems, pages 3789–3794, Florence, Italy, 2008.
:
The record appears in these collections:
Refereed Conference Papers
Usable Security