Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 18 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
1. User-centered design of identity and access management systems / Pooya Jaferian [LERSSE-THESIS-2014-001]
IT security management (ITSM) technologies are important components of IT security in organizations. [...]
Published in Pooya Jaferian, "User-centered design of identity and access management systems," PhD dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, December, 2014, pp.314:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
2. To authorize or not authorize: helping users review access policies in organizations / Pooya Jaferian ; Hootan Rashtian ; Konstantin Beznosov [LERSSE-RefConfPaper-2014-003]
This work addresses the problem of reviewing complex access policies in an organizational context using two studies [...]
Published in Pooya Jaferian, Hootan Rashtian, and Konstantin Beznosov. 2014. To authorize or not authorize: helping users review access policies in organizations. SOUPS'14: Symposium On Usable Privacy and Security. Menlo Park, CA.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
3. To Befriend Or Not? A Model of Friend Request Acceptance on Facebook / Hootan Rashtian ; Yazan Boshmaf ; Pooya Jaferian ; Konstantin Beznosov [LERSSE-RefConfPaper-2014-002]
Accepting friend requests from strangers in Facebook-like online social networks is known to be a risky behavior. [...]
Published in Rashtian, H., Boshmaf, Y., Jaferian, P., Beznosov, K. (2014, July). To Befriend Or Not? A Model of Friend Request Acceptance on Facebook. In Proceedings of the 10th symposium on Usable Privacy and Security. ACM.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
4. Access Review Survey Report / Pooya Jaferian ; Konstantin Beznosov [LERSSE-REPORT-2014-001]
To further understand the state of the practice in access review, and collect quantitative results on how companies perform access review, we conducted a survey of security practitioners [...]
Published in P. Jaferian and K. Beznosov. Access Review Survey Report. Technical Report LERSSE-TR-2014-001, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, May 2014.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
5. Heuristics for Evaluating IT Security Management Tools / Pooya Jaferian ; Kirstie Hawkey ; Andreas Sotirakopoulos ; Maria Velez-Rojas ; et al [LERSSE-RefJnlPaper-2013-002]
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. [...]
Published in Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov, Heuristics for Evaluating IT Security Management Tools, Accepted in Human–Computer Interaction, doi:10.1080/07370024.2013.819198.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
6. Heuristics for Evaluating IT Security Management Tools / Pooya Jaferian ; Kirstie Hawkey ; Andreas Sotirakopoulos ; Maria Velez-Rojas ; et al [LERSSE-RefConfPaper-2011-006]
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. [...]
Published in Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov, Heuristics for Evaluating IT Security Management Tools, in Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Carnegie Mellon University, Pittsburgh, PA, USA, July 20-22, 2011. :
Transfer from CDS 0.99.7: Download fulltextPDF;
7. Heuristics for Evaluating IT Security Management Tools / Pooya Jaferian ; Kirstie Hawkey ; Andreas Sotirakopoulos ; Konstantin Beznosov [LERSSE-RefConfPaper-2011-002]
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive [...]
Published in Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, and Konstantin Beznosov, Heuristics for Evaluating IT Security Management Tools, In Proceedings of the 29th international conference extended abstracts on Human factors in computing systems (CHI '11), Vancouver, Canada, 2011. :
Transfer from CDS 0.99.7: Download fulltextPDF;
8. It's Too Complicated, So I Turned It Off! Expectations, Perceptions, and Misconceptions of Personal Firewalls / Fahimeh Raja ; Kirstie Hawkey ; Pooya Jaferian ; Konstantin Beznosov ; et al [LERSSE-RefConfPaper-2010-008]
Even though personal firewalls are an important aspect of security for the users of personal computers, little attention has been given to their usability. [...]
Published in Fahimeh Raja, Kirstie Hawkey, Pooya Jaferian, Konstantin Beznosov, and Kellogg S. Booth. It's Too Complicated, So I Turned It Off! Expectations, Perceptions, and Misconceptions of Personal Firewalls. In Proceedings of the Third ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), October 4, 2010.:
Transfer from CDS 0.99.7: Download fulltextPDF;
9. Challenges in evaluating complex IT security management systems / Pooya Jaferian ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-RefConfPaper-2010-005]
Performing ecologically valid user studies for IT security management (ITSM) systems is challenging. [...]
Published in P. Jaferian, K. Hawkey, and K. Beznosov. Challenges in evaluating complex IT security management systems. In SOUPS Usable Security Experiment Reports (USER) Workshop, 2010.:
Transfer from CDS 0.99.7: Download fulltextPDF;
10. Expectations, Perceptions, and Misconceptions of Personal Firewalls / Fahimeh Raja ; Kirstie Hawkey ; Pooya Jaferian ; Konstantin Beznosov ; et al [LERSSE-POSTER-2010-007]
In this research, our goal is to better understand users' knowledge, expectations, perceptions, and misconceptions of personal firewalls. [...]
Published in Raja, F., Jaferian, P., Hawkey, K., Beznosov, K., Booth, K. 2009. Expectations, Perceptions, and Misconceptions of Personal Firewalls. In Proceedings of the 6th Symposium on Usable Privacy and Security (Redmond, WA, July 14 - 16, 2010). SOUPS '10. ACM, New York, NY, 1-2.:
Transfer from CDS 0.99.7: Download fulltextPDF;

Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) : 18 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Set up a personal email alert or subscribe to the RSS feed.