This thesis investigates four different aspects of information security management: challenges faced by security practitioners, interactive collaborations among security practitioners and other stakeholders, diagnostic work performed by security practitioners during the response to incidents, and factors that impact the adoption of an intrusion detection system in one organization. Our approach is based on qualitative analyzes of empirical data from semi-structured interviews and participatory observation. For each theme under study, the contributions of the qualitative analy-sis are twofold. First, we provide a richer understanding of the main factors that affect the security within organizations. Second, equipped with this richer understa...
In today's world, IT security plays a critical role in different organizations, yet little is known ...
Our qualitative research provides a comprehensive list of challenges to the practice of IT security ...
Given that Information Technology (IT) has become pervasive in today's organizations, properly secur...
This thesis investigates four different aspects of information security management: challenges faced...
This thesis investigates four different aspects of information security management: challenges faced...
This study investigates the context of interactions of IT security practitioners, based on a qualita...
Abstract Purpose – The purpose of this study is to determine the main challenges that IT security ...
This study investigates the context of interactions of IT security practitioners, based on a qualita...
Security of information technology (IT) has become a critical issue for organizations as they must p...
Security of information technology (IT) has become a critical issue for organizations as they must p...
This study develops the context of interactions of IT security practitioners. Preliminary qualitativ...
Purpose — The purpose of this study is to examine security incident response practices of IT securit...
Purpose – The purpose of this paper is to examine security incident response practices of informatio...
Security of information technology (IT) has become a critical issue for organizations as they must p...
This paper describes the HOT Admin research project, which is investigating the human, organizationa...
In today's world, IT security plays a critical role in different organizations, yet little is known ...
Our qualitative research provides a comprehensive list of challenges to the practice of IT security ...
Given that Information Technology (IT) has become pervasive in today's organizations, properly secur...
This thesis investigates four different aspects of information security management: challenges faced...
This thesis investigates four different aspects of information security management: challenges faced...
This study investigates the context of interactions of IT security practitioners, based on a qualita...
Abstract Purpose – The purpose of this study is to determine the main challenges that IT security ...
This study investigates the context of interactions of IT security practitioners, based on a qualita...
Security of information technology (IT) has become a critical issue for organizations as they must p...
Security of information technology (IT) has become a critical issue for organizations as they must p...
This study develops the context of interactions of IT security practitioners. Preliminary qualitativ...
Purpose — The purpose of this study is to examine security incident response practices of IT securit...
Purpose – The purpose of this paper is to examine security incident response practices of informatio...
Security of information technology (IT) has become a critical issue for organizations as they must p...
This paper describes the HOT Admin research project, which is investigating the human, organizationa...
In today's world, IT security plays a critical role in different organizations, yet little is known ...
Our qualitative research provides a comprehensive list of challenges to the practice of IT security ...
Given that Information Technology (IT) has become pervasive in today's organizations, properly secur...