Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 10 records found  Search took 0.00 seconds. 
1. Toward Understanding Distributed Cognition in IT Security Management: The Role of Cues and Norms / David Botta ; Kasia Muldner ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-RefJnlPaper-2010-002]
Information technology security management (ITSM) entails significant challenges, including the distribution of tasks and stakeholders across the organization, the need for security practitioners to cooperate with others, and technological complexity. [...]
Published in 1. D. Botta, K. Muldner, K. Hawkey, and K. Beznosov, “Toward Understanding Distributed Cognition in IT Security Management: The Role of Cues and Norms,” accepted for publication to the International Journal of Cognition, Technology and Work on 16 / Aug / 2010.:
Transfer from CDS 0.99.7: Download fulltextPDF;
2. Preparation, detection, and analysis: the diagnostic work of IT security incident response / Rodrigo Werlinger ; Kasia Muldner ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-RefJnlPaper-2009-013]
Purpose — The purpose of this study is to examine security incident response practices of IT security practitioners as a diagnostic work process, including the preparation phase, detection, and analysis of anomalies. [...]
Published in Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, and Konstantin Beznosov. Preparation, detection, and analysis: the diagnostic work of IT security incident response. Journal of Information Management & Computer Security, 18(1):26-42, January 2010. :
Transfer from CDS 0.99.7: Download fulltextPDF;
3. Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents / Rodrigo Werlinger ; Kasia Muldner ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-RefConfPaper-2009-037]
This study investigates how security practitioners perform diagnostic work during the identification of security incidents. [...]
Published in Werlinger, R., Muldner, K., Hawkey, K., and Beznosov, K. (2009). Towards Understanding Diagnostic Work during the Detection and Investigation of Security Incidents. Proc. of Int. Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, June 25-26, 2009, 119-132.:
Transfer from CDS 0.99.7: Download fulltextPDF;
4. Effectiveness of IT Security Tools in Practice / Fahimeh Raja ; Kasia Muldner ; Konstantin Beznosovz [LERSSE-REPORT-2009-033]
In today's world, IT security plays a critical role in different organizations, yet little is known about IT security in the context of organizations. [...]
Published in Fahimeh Raja, Kasia Muldner, and Konstantin Beznosovz. Effectiveness of it security tools in practice. Technical Report LERSSE-TR-2009-33, University of British Columbia, March 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
5. Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs / Kirstie Hawkey ; Kasia Muldner ; Konstantin Beznosov [LERSSE-RefJnlPaper-2008-004]
IT security professionals’ effectiveness in an organization is influenced not only by how usable their security management tools are but also by how well the organization’s security management model (SMM) fits. [...]
Published in Kirstie Hawkey, Kasia Muldner and Konstantin Beznosov, "Searching for the Right Fit Balancing IT Security Management Model Trade-Offs", Special Issue on Useful Computer Security, IEEE Internet Computing Magazine, 12(3), 2008, p. 22-30.:
Transfer from CDS 0.99.7: Download fulltextPDF;
6. The Challenges of Using an Intrusion Detection System: Is It Worth the Effort? / Rodrigo Werlinger ; Kirstie Hawkey ; Kasia Muldner ; Pooya Jaferian ; et al [LERSSE-RefConfPaper-2008-029]
An intrusion detection system (IDS) can be a key component of security incident response within organizations. [...]
Published in R. Werlinger, K. Hawkey, K. Muldner, P. Jaferian, and K. Beznosov. The challenges of using an intrusion detection system: Is it worth the effort? In Proc. of ACM Symposium on Usable Privacy and Security (SOUPS) , pp 107 - 116 , 2008:
Transfer from CDS 0.99.7: Download fulltextPDF;
7. Identifying Differences Between Security and Other IT Professionals: a Qualitative Analysis. / Andre Gagne ; Kasia Muldner ; Konstantin Beznosov [LERSSE-RefConfPaper-2008-027]
We report factors differentiating security and other IT responsibilities. [...]
Published in Andre Gagne, Kasia Muldner, and Konstantin Beznosov. Identifying Differences between Security and other IT Professionals: a Qualitative Analysis. In proceedings of Human Aspects of Information Security and Assurance (HAISA), Plymouth, England, July 2008, pp 69-80.:
Transfer from CDS 0.99.7: Download fulltextPDF;
8. Human, Organizational, and Technological Factors of IT Security / Kirstie Hawkey ; David Botta ; Kasia Muldner ; Rodrigo Werlinger ; et al [LERSSE-RefConfPaper-2008-024]
This paper describes the HOT Admin research project, which is investigating the human, organizational, and technological factors of IT security from the perspective of security practitioners. [...]
Published in Hawkey, K., Botta, D., Muldner, K., Werlinger, R., Gagne, A., Beznosov, K., "Human, Organizational, and Technological Factors of IT Security" In CHI’08 extended abstract on Human factors in computing systems, pages 3639–3644, Florence, Italy, 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
9. Human, Organizational and Technological Factors of IT Security / Kasia Muldner [LERSSE-PRESENTATION-2008-065]
Given that Information Technology (IT) has become pervasive in today’s organizations, properly securing systems is critical. [...]
Published in Kasia Muldner, " Human, Organizational and Technological Factors of IT Security", Invited Talk at Acadia University, Wofville, N.S., Canada, 25 January, 2007.:
Transfer from CDS 0.99.7: Download fulltextPDF;
10. Searching for the Right Fit: A Case Study of IT Security Management Model Tradeoffs / Kirstie Hawkey ; Kasia Muldner ; Konstantin Beznosov [LERSSE-REPORT-2007-024]
The usability of security systems within an organization is impacted not only by tool interfaces but also by the security management model (SMM) of the IT security team. [...]
Published in Kirstie Hawkey, Kasia Muldnery, and Konstantin Beznosov, "Searching for the Right Fit: A Case Study of IT Security Management Model Tradeoffs", Laboratory for Education and Research in Secure Systems Engineering, Vancouver, Canada, University of British Columbia, technical report LERSSE-TR-2007-03, 16 November, 2007, pp.23.:
Transfer from CDS 0.99.7: Download fulltextPDF;

Interested in being notified about new results for this query?
Subscribe to the RSS feed.