This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine different activities that require interactions between security practitioners and other stakeholders, and describe in detail two of these activities that may serve as useful references for usability scenarios of security tools. We propose a model of the factors contributing to the complexity of interactions between security practitioners and other stakeholders, and discuss how this complexity is a potential source of security issues that increase the risk level within organizations. Our analysis also reveals that the tools used by our participants to perform their ...
Given that Information Technology (IT) has become pervasive in today's organizations, properly secur...
The security administration of large organizations is exceptionally challenging due to the increasin...
Our qualitative research provides a comprehensive list of challenges to the practice of IT security ...
This study investigates the context of interactions of IT security practitioners, based on a qualita...
This study develops the context of interactions of IT security practitioners. Preliminary qualitativ...
This thesis investigates four different aspects of information security management: challenges faced...
This thesis investigates four different aspects of information security management: challenges faced...
Security of information technology (IT) has become a critical issue for organizations as they must p...
Security of information technology (IT) has become a critical issue for organizations as they must p...
We report factors differentiating security and other IT responsibilities. Our findings are based on ...
In today's world, IT security plays a critical role in different organizations, yet little is known ...
Abstract Purpose – The purpose of this study is to determine the main challenges that IT security ...
We report preliminary results of our ongoing field study of IT professionals who are involved in sec...
Security of information technology (IT) has become a critical issue for organizations as they must p...
This paper seeks to provide an overview of how companies assess and manage security risks in practic...
Given that Information Technology (IT) has become pervasive in today's organizations, properly secur...
The security administration of large organizations is exceptionally challenging due to the increasin...
Our qualitative research provides a comprehensive list of challenges to the practice of IT security ...
This study investigates the context of interactions of IT security practitioners, based on a qualita...
This study develops the context of interactions of IT security practitioners. Preliminary qualitativ...
This thesis investigates four different aspects of information security management: challenges faced...
This thesis investigates four different aspects of information security management: challenges faced...
Security of information technology (IT) has become a critical issue for organizations as they must p...
Security of information technology (IT) has become a critical issue for organizations as they must p...
We report factors differentiating security and other IT responsibilities. Our findings are based on ...
In today's world, IT security plays a critical role in different organizations, yet little is known ...
Abstract Purpose – The purpose of this study is to determine the main challenges that IT security ...
We report preliminary results of our ongoing field study of IT professionals who are involved in sec...
Security of information technology (IT) has become a critical issue for organizations as they must p...
This paper seeks to provide an overview of how companies assess and manage security risks in practic...
Given that Information Technology (IT) has become pervasive in today's organizations, properly secur...
The security administration of large organizations is exceptionally challenging due to the increasin...
Our qualitative research provides a comprehensive list of challenges to the practice of IT security ...