Author of the publication

Towards understanding IT security professionals and their tools.

, , , , , , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 100-111. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Cursor as an Artistic Expression in Jeddah., , and . ICEC, volume 6972 of Lecture Notes in Computer Science, page 444-447. Springer, (2011)A multi-method approach for user-centered design of identity management systems., , , and . SOUPS, ACM, (2009)Guidelines for designing IT security management tools., , , , and . CHIMIT, page 7. ACM, (2008)A case study of enterprise identity management system adoption in an insurance organization., , , and . CHIMIT, ACM, (2009)Detecting, analyzing and responding to security incidents: a qualitative analysis., , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 149-150. ACM, (2007)Toward understanding distributed cognition in IT security management: the role of cues and norms., , , and . Cogn. Technol. Work., 13 (2): 121-134 (2011)Towards understanding IT security professionals and their tools., , , , , , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 100-111. ACM, (2007)Lotus Spring., , , and . SIGGRAPH Abstracts and Applications, page 330. ACM, (1998)Human, organizational, and technological factors of IT security., , , , , and . CHI Extended Abstracts, page 3639-3644. ACM, (2008)Security practitioners in context: Their activities and interactions with other stakeholders within organizations., , , and . Int. J. Hum. Comput. Stud., 67 (7): 584-606 (2009)