Studying IT security professionals: research design and lessons learned. Botta, D., Werlinger, R., Gagné, A., Beznosov, K., Iverson, L., Fels, S., & Fisher, B. In Workshop on security user studies: methodologies and best practices, 2007. bibtex @inproceedings{botta2007studying,
title={Studying IT security professionals: research design and lessons learned},
author={Botta, David and Werlinger, Rodrigo and Gagn{\'e}, Andr{\'e} and Beznosov, Konstantin and Iverson, Lee and Fels, Sidney and Fisher, Brian},
booktitle={Workshop on security user studies: methodologies and best practices},
year={2007}
}
Downloads: 0
{"_id":"fS5fqdm9nzzkYYAjB","bibbaseid":"botta-werlinger-gagn-beznosov-iverson-fels-fisher-studyingitsecurityprofessionalsresearchdesignandlessonslearned-2007","author_short":["Botta, D.","Werlinger, R.","Gagné, A.","Beznosov, K.","Iverson, L.","Fels, S.","Fisher, B."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Studying IT security professionals: research design and lessons learned","author":[{"propositions":[],"lastnames":["Botta"],"firstnames":["David"],"suffixes":[]},{"propositions":[],"lastnames":["Werlinger"],"firstnames":["Rodrigo"],"suffixes":[]},{"propositions":[],"lastnames":["Gagné"],"firstnames":["André"],"suffixes":[]},{"propositions":[],"lastnames":["Beznosov"],"firstnames":["Konstantin"],"suffixes":[]},{"propositions":[],"lastnames":["Iverson"],"firstnames":["Lee"],"suffixes":[]},{"propositions":[],"lastnames":["Fels"],"firstnames":["Sidney"],"suffixes":[]},{"propositions":[],"lastnames":["Fisher"],"firstnames":["Brian"],"suffixes":[]}],"booktitle":"Workshop on security user studies: methodologies and best practices","year":"2007","bibtex":"@inproceedings{botta2007studying,\n title={Studying IT security professionals: research design and lessons learned},\n author={Botta, David and Werlinger, Rodrigo and Gagn{\\'e}, Andr{\\'e} and Beznosov, Konstantin and Iverson, Lee and Fels, Sidney and Fisher, Brian},\n booktitle={Workshop on security user studies: methodologies and best practices},\n year={2007}\n}\n\n","author_short":["Botta, D.","Werlinger, R.","Gagné, A.","Beznosov, K.","Iverson, L.","Fels, S.","Fisher, B."],"key":"botta2007studying","id":"botta2007studying","bibbaseid":"botta-werlinger-gagn-beznosov-iverson-fels-fisher-studyingitsecurityprofessionalsresearchdesignandlessonslearned-2007","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/M8Cusi6NcZNqEmNN7","dataSources":["gdEygGa34uWkjynDQ","ikcgcNLWkPYd7asYj","YAZ3EPKt9iuMHML8Y","Z66AwpjqbyDaCRuAz","vzLiYoozjbMtpq3bv","yyg88BndAbrgER4pG","qxYmJrWKptQFZpZn2","uXASf7FkwMkTdi7XQ","L3Q9QEq5gEyYsbhX8","PCm8nFZLWR38NRiRu","jagWcnNcoBLvejBcm","8cHa97bWQybuQhHDo","Kx35bmNmuB9SWebed","M5QirAZCjcxYLMFLM","BpNnApTKxApG4JxkD","BuaeMqxTDRXAZtmNe","r8QoBNxamnpCZ3Dwb"],"keywords":[],"search_terms":["studying","security","professionals","research","design","lessons","learned","botta","werlinger","gagné","beznosov","iverson","fels","fisher"],"title":"Studying IT security professionals: research design and lessons learned","year":2007}