Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 25 records found  beginprevious16 - 25  jump to record: Search took 0.00 seconds. 
16. Revealing Hidden Context: Improving Users' Mental Models of Personal Firewalls / Fahimeh Raja ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-PRESENTATION-2009-078]
Windows Vista’s personal firewall provides its diverse users with a basic interface that hides many operational details. [...]
Published in Talk given at Symposium On Usable Privacy and Security (SOUPS), July 2009, at Google in Mountain View, California, US.:
Transfer from CDS 0.99.7: Download fulltextPDF;
17. User Centered Design of ITSM Tools / Pooya Jaferian [LERSSE-PRESENTATION-2009-077]
IT Security Management (ITSM) requires collaboration between diverse stakeholders, has an environment of numerous technological and business specializations (is complex), has many issues that need to be handled with discretion, is fast paced, uncertain, requires reliance of practitioners on tacit knowledge, and there is lack of immediate feedback when imposing a change on the system. [...]
Published in Talk given at NSERC ISSNet Workshop 2009, Carleton University, Ottawa, Canada.:
Transfer from CDS 0.99.7: Download fulltextPDF;
18. Revealing Hidden Context: Improving Mental Models of Personal Firewall Users / Fahimeh Raja ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-PRESENTATION-2009-076]
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. [...]
Published in Talk given at NSERC ISSNet Workshop 2009, Carleton University, Ottawa, Canada.:
Transfer from CDS 0.99.7: Download fulltextPDF;
19. Open Problems in Web 2.0 User Content Sharing / San-Tsai Sun ; Konstantin Beznosov [LERSSE-RefConfPaper-2009-035]
Users need useful mechanisms for sharing their Web 2.0 content with each other in a controlled manner across boundaries of content-hosting and service providers (CSPs). [...]
Published in San-Tsai Sun and Konstantin Beznosov. Open problems in Web 2.0 user content sharing. In Proceedings of the iNetSec Workshop, pages 37-51, Zurich, Switzerland, April 23th 2009.:
Transfer from CDS 0.99.7: Download fulltextPDF;
20. Towards Web 2.0 Content Sharing Beyond Walled Gardens / San-Tsai Sun ; Konstantin Beznosov [LERSSE-PRESENTATION-2009-075]
Web 2.0 users need usable mechanisms for sharing their content with each other in a controlled manner across boundaries of content-hosting or application-service providers (CSPs). [...]
Published in Talk given at NSERC ISSNet Workshop 2009, Carleton University, Ottawa, Canada:
Transfer from CDS 0.99.7: Download fulltextPPT;
21. Revealing Hidden Context: Improving Mental Models of Personal Firewall Users / Fahimeh Raja ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-RefConfPaper-2009-034]
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details [...]
Published in Fahimeh Raja, Kirstie Hawkey, and Konstantin Beznosov. Revealing hidden context: Improving mental models of personal firewall users. In SOUPS '09: Proceedings of the 5th symposium on Usable privacy and security, New York, NY, USA, 2009. ACM, pp 1-12. :
Transfer from CDS 0.99.7: Download fulltextPDF;
22. A Usability Analysis of Microsoft Windows Vista’s Firewall / Arun Chebium ; Pooya Jaferian ; Nima Kaviani ; Fahimeh Raja [LERSSE-REPORT-2009-031]
The usability of personal firewalls has not received a significant amount of attention in the literature. [...]
Published in Arun Chebium, Pooya Jaferian, Nima Kaviani, Fahimeh Raja, "A Usability Analysis of Microsoft Windows Vista’s Firewall", term project report, CPSC 544, University of British Columbia, Canada, Spring 2007. :
Transfer from CDS 0.99.7: Download fulltextPDF;
23. Usability Study of Windows Vista’s Firewall / Pooya Jaferian [LERSSE-REPORT-2009-029]
Windows Vista is shipped with a built-in personal firewall. [...]
Published in Pooya Jaferian,"Usability Study of Windows Vista’s Firewall", EECE 512 term report, Spring 2008, University of British Columbia, Canada:
Transfer from CDS 0.99.7: Download fulltextPDF;
24. Guidelines for Designing IT Security Management Tools / Pooya Jaferian ; David Botta ; Fahimeh Raja ; Kirstie Hawkey ; et al [LERSSE-RefConfPaper-2008-030]
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. [...]
Published in Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov, "Guidelines for Designing IT Security Management Tools," In CHIMIT '08: Proceedings of the 2008 symposium on Computer Human Interaction for the Management of Information Technology, San Diego, CA, USA, 7:1-7:10, ACM.:
Transfer from CDS 0.99.7: Download fulltextPDF;
25. The Challenges of Using an Intrusion Detection System: Is It Worth the Effort? / Rodrigo Werlinger ; Kirstie Hawkey ; Kasia Muldner ; Pooya Jaferian ; et al [LERSSE-RefConfPaper-2008-029]
An intrusion detection system (IDS) can be a key component of security incident response within organizations. [...]
Published in R. Werlinger, K. Hawkey, K. Muldner, P. Jaferian, and K. Beznosov. The challenges of using an intrusion detection system: Is it worth the effort? In Proc. of ACM Symposium on Usable Privacy and Security (SOUPS) , pp 107 - 116 , 2008:
Transfer from CDS 0.99.7: Download fulltextPDF;

Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) : 25 records found   beginprevious16 - 25  jump to record:
Interested in being notified about new results for this query?
Set up a personal email alert or subscribe to the RSS feed.