Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 35 records found  beginprevious21 - 30next  jump to record: Search took 0.01 seconds. 
21. Security Practitioners in Context: Their Activities and Interactions / Rodrigo Werlinger ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-RefConfPaper-2008-025]
This study develops the context of interactions of IT security practitioners [...]
Published in Rodrigo Werlinger, Kirstie Hawkey, and Konstantin Beznosov. Security practitioners in context: their activities and interactions. In CHI ’08 extended abstracts on Human factors in computing systems, pages 3789–3794, Florence, Italy, 2008. :
Transfer from CDS 0.99.7: Download fulltextPDF;
22. Searching for the Right Fit: Considerations when Balancing IT Security Management Model Tradeoffs / Kirstie Hawkey, Kasia Muldner and Konstantin Beznosov [LERSSE-POSTER-2008-004]
The effectiveness of IT security professionals in an organization is influenced not only by the usability of security management tools, but also by the fit of an organization's security management model (SMM). [...]
Published in Kirstie Hawkey, Kasia Muldner, Konstantin Beznosov, "Searching for the Right Fit: Considerations when Balancing IT Security Management Model Tradeoffs", Poster presented at the 7th Annual Conference & Exposition Privacy & Security Conference, Victoria, B.C., February 7-8, 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
23. Human, Organizational, and Technological Factors of IT Security / Kirstie Hawkey ; David Botta ; Kasia Muldner ; Rodrigo Werlinger ; et al [LERSSE-RefConfPaper-2008-024]
This paper describes the HOT Admin research project, which is investigating the human, organizational, and technological factors of IT security from the perspective of security practitioners. [...]
Published in Hawkey, K., Botta, D., Muldner, K., Werlinger, R., Gagne, A., Beznosov, K., "Human, Organizational, and Technological Factors of IT Security" In CHI’08 extended abstract on Human factors in computing systems, pages 3639–3644, Florence, Italy, 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
24. Human, Organizational and Technological Factors of IT Security / Kasia Muldner [LERSSE-PRESENTATION-2008-065]
Given that Information Technology (IT) has become pervasive in today’s organizations, properly securing systems is critical. [...]
Published in Kasia Muldner, " Human, Organizational and Technological Factors of IT Security", Invited Talk at Acadia University, Wofville, N.S., Canada, 25 January, 2007.:
Transfer from CDS 0.99.7: Download fulltextPDF;
25. Searching for the Right Fit: A Case Study of IT Security Management Model Tradeoffs / Kirstie Hawkey ; Kasia Muldner ; Konstantin Beznosov [LERSSE-REPORT-2007-024]
The usability of security systems within an organization is impacted not only by tool interfaces but also by the security management model (SMM) of the IT security team. [...]
Published in Kirstie Hawkey, Kasia Muldnery, and Konstantin Beznosov, "Searching for the Right Fit: A Case Study of IT Security Management Model Tradeoffs", Laboratory for Education and Research in Secure Systems Engineering, Vancouver, Canada, University of British Columbia, technical report LERSSE-TR-2007-03, 16 November, 2007, pp.23.:
Transfer from CDS 0.99.7: Download fulltextPDF;
26. On the Imbalance of the Security Problem Space and its Expected Consequences / Konstantin Beznosov ; Olga Beznosova [LERSSE-PRESENTATION-2007-064]
This paper considers the attacker-defender game in the field of computer security as a three-dimensional phenomenon [...]
Published in Konstantin Beznosov, Olga Beznosova "On the Imbalance of the Security Problem Space and its Expected Consequences," Presented at the Symposium on Human Aspects of Information Security & Assurance (HAISA), Plymouth, UK, 10 July, 2007, pp.29.:
Transfer from CDS 0.99.7: Download fulltextPDF;
27. A Study of Security Administration Errors / Kartik Markandan [LERSSE-REPORT-2007-021]
Security administrators prevent security breaches against their infrastructure by using their tools to implement the security policy. [...]
Published in Kartik Markandan, "A Study of Security Administration Errors", Laboratory for Education and Research in Secure Systems Engineering, Vancouver, Canada, University of British Columbia, technical report LERSSE-TR-2006-03, 17 December, 2006, pp.12.:
Transfer from CDS 0.99.7: Download fulltextPDF;
28. Towards Understanding IT Security Professionals and Their Tools / David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al [LERSSE-PRESENTATION-2007-062]
It is estimated that organizations worldwide will spend around $100 Billion USD on IT Security in 2007. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Sid Fels, Lee Iverson, Brian Fisher, "Towards Understanding IT Security Professionals and Their Tools," CIPS Vancouver Security SIG Meeting, Vancouver, 13 June, 2007, pp.20.:
Transfer from CDS 0.99.7: Download fulltextPDF;
29. Detecting, Analyzing and Responding to Security Incidents: A Qualitative Analysis / Rodrigo Werlinger ; David Botta [LERSSE-RefConfPaper-2007-024]
This study develops categories of responses to security incidents, based on a grounded theory analysis of interviews with security practitioners, with a focus on the tasks performed during security incidents, and the necessary resources to perform these tasks. [...]
Published in Rodrigo Werlinger, David Botta, "Detecting, Analyzing and Responding to Security Incidents: A Qualitative Analysis," in Workshop on Usable IT Security Management (USM'07), July 18, 2007, Pittsburgh, PA, USA.:
Transfer from CDS 0.99.7: Download fulltextPDF;
30. Understanding IT Security Administration through a Field Study / David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al [LERSSE-REPORT-2007-002] [LERSSE-REPORT-2007-020]
The security administration of large organizations is exceptionally challenging due to the increasingly large numbers of application instances, resources, and users; the growing complexity and dynamics of business processes; and the spiralling volume of change that results from the interaction of the first two factors. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels and Brian Fisher, "Understanding Information Technology Security Administration through a Field Study", Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, 2007:
Transfer from CDS 0.99.7: Download fulltextPDF;

Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) : 35 records found   beginprevious21 - 30next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.