1.
|
Advancing the Understanding of Android Unlocking and Usage
/ Lina Qiu
[LERSSE-THESIS-2018-001]
Research efforts have been made towards creating mobile authentication systems to better serve users’ concerns regarding usability and security. [...]
Published in Lina Qiu, "Advancing the Understanding of Android Unlocking and Usage", MASc Thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, May, 2018:
Fulltext: PDF PDF (PDFA);
|
2.
|
Searching for the Right Fit: A Case Study of IT Security Management Model Tradeoffs
/ Kirstie Hawkey ; Kasia Muldner ; Konstantin Beznosov
[LERSSE-REPORT-2007-024]
The usability of security systems within an organization is impacted not only by tool interfaces but also by the security management model (SMM) of the IT security team. [...]
Published in Kirstie Hawkey, Kasia Muldnery, and Konstantin Beznosov, "Searching for the Right Fit: A Case Study of IT Security Management Model Tradeoffs", Laboratory for Education and Research in Secure Systems Engineering, Vancouver, Canada, University of British Columbia, technical report LERSSE-TR-2007-03, 16 November, 2007, pp.23.:
Transfer from CDS 0.99.7: PDF;
|
3.
|
Towards Understanding IT Security Professionals and Their Tools
/ David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al
[LERSSE-PRESENTATION-2007-062]
It is estimated that organizations worldwide will spend around $100 Billion USD on IT Security in 2007. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Sid Fels, Lee Iverson, Brian Fisher, "Towards Understanding IT Security Professionals and Their Tools," CIPS Vancouver Security SIG Meeting, Vancouver, 13 June, 2007, pp.20.:
Transfer from CDS 0.99.7: PDF;
|
4.
|
Understanding IT Security Administration through a Field Study
/ David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al
[LERSSE-REPORT-2007-002]
[LERSSE-REPORT-2007-020]
The security administration of large organizations is exceptionally challenging due to the increasingly large numbers of application instances, resources, and users; the growing complexity and dynamics of business processes; and the spiralling volume of change that results from the interaction of the first two factors. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels and Brian Fisher, "Understanding Information Technology Security Administration through a Field Study", Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, 2007:
Transfer from CDS 0.99.7: PDF;
|
5.
|
Studying IT Security Professionals: Research Design and Lessons Learned
/ David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al
[LERSSE-RefConfPaper-2007-020]
The HOT Admin Field Study used qualitative methods to study information technology security administrators. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, and Brian Fisher, "Studying IT Security Professionals: Research Design and Lessons Learned" position paper at the CHI Workshop on Security User studies: Methodologies and Best Practices, San Francisco, CA, 28 April 2007, 4 pages.:
Transfer from CDS 0.99.7: PDF;
|