{"_id":"3re4DE5irvPkMuoD5","bibbaseid":"jaferian-botta-raja-hawkey-beznosov-guidelinesfordesigningitsecuritymanagementtools-2008","author_short":["Jaferian, P.","Botta, D.","Raja, F.","Hawkey, K.","Beznosov, K."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Guidelines for designing it security management tools","author":[{"propositions":[],"lastnames":["Jaferian"],"firstnames":["Pooya"],"suffixes":[]},{"propositions":[],"lastnames":["Botta"],"firstnames":["David"],"suffixes":[]},{"propositions":[],"lastnames":["Raja"],"firstnames":["Fahimeh"],"suffixes":[]},{"propositions":[],"lastnames":["Hawkey"],"firstnames":["Kirstie"],"suffixes":[]},{"propositions":[],"lastnames":["Beznosov"],"firstnames":["Konstantin"],"suffixes":[]}],"booktitle":"Proceedings of the 2nd ACM Symposium on Computer Human interaction For Management of information Technology","pages":"1–10","year":"2008","bibtex":"@inproceedings{jaferian2008guidelines,\n title={Guidelines for designing it security management tools},\n author={Jaferian, Pooya and Botta, David and Raja, Fahimeh and Hawkey, Kirstie and Beznosov, Konstantin},\n booktitle={Proceedings of the 2nd ACM Symposium on Computer Human interaction For Management of information Technology},\n pages={1--10},\n year={2008}\n}\n\n","author_short":["Jaferian, P.","Botta, D.","Raja, F.","Hawkey, K.","Beznosov, K."],"key":"jaferian2008guidelines","id":"jaferian2008guidelines","bibbaseid":"jaferian-botta-raja-hawkey-beznosov-guidelinesfordesigningitsecuritymanagementtools-2008","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/M8Cusi6NcZNqEmNN7","dataSources":["gdEygGa34uWkjynDQ","ikcgcNLWkPYd7asYj","WjyYKjDEeDNZ5D7kg","YAZ3EPKt9iuMHML8Y","Z66AwpjqbyDaCRuAz","vzLiYoozjbMtpq3bv","yyg88BndAbrgER4pG","qxYmJrWKptQFZpZn2","uXASf7FkwMkTdi7XQ","L3Q9QEq5gEyYsbhX8","PCm8nFZLWR38NRiRu","jagWcnNcoBLvejBcm","8cHa97bWQybuQhHDo","Kx35bmNmuB9SWebed","M5QirAZCjcxYLMFLM","BpNnApTKxApG4JxkD","BuaeMqxTDRXAZtmNe","r8QoBNxamnpCZ3Dwb"],"keywords":[],"search_terms":["guidelines","designing","security","management","tools","jaferian","botta","raja","hawkey","beznosov"],"title":"Guidelines for designing it security management tools","year":2008}