Author of the publication

Toward understanding distributed cognition in IT security management: the role of cues and norms.

, , , and . Cogn. Technol. Work., 13 (2): 121-134 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Cursor as an Artistic Expression in Jeddah., , and . ICEC, volume 6972 of Lecture Notes in Computer Science, page 444-447. Springer, (2011)A multi-method approach for user-centered design of identity management systems., , , and . SOUPS, ACM, (2009)Guidelines for designing IT security management tools., , , , and . CHIMIT, page 7. ACM, (2008)Lotus Spring., , , and . SIGGRAPH Abstracts and Applications, page 330. ACM, (1998)Human, organizational, and technological factors of IT security., , , , , and . CHI Extended Abstracts, page 3639-3644. ACM, (2008)Towards understanding IT security professionals and their tools., , , , , , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 100-111. ACM, (2007)Toward understanding distributed cognition in IT security management: the role of cues and norms., , , and . Cogn. Technol. Work., 13 (2): 121-134 (2011)A case study of enterprise identity management system adoption in an insurance organization., , , and . CHIMIT, ACM, (2009)Detecting, analyzing and responding to security incidents: a qualitative analysis., , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 149-150. ACM, (2007)Security practitioners in context: Their activities and interactions with other stakeholders within organizations., , , and . Int. J. Hum. Comput. Stud., 67 (7): 584-606 (2009)