{"_id":"YMwybMvXPHdWcQRGD","bibbaseid":"jaferian-hawkey-sotirakopoulos-velezrojas-beznosov-heuristicsforevaluatingitsecuritymanagementtools-2011","author_short":["Jaferian, P.","Hawkey, K.","Sotirakopoulos, A.","Velez-Rojas, M.","Beznosov, K."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Heuristics for evaluating IT security management tools","author":[{"propositions":[],"lastnames":["Jaferian"],"firstnames":["Pooya"],"suffixes":[]},{"propositions":[],"lastnames":["Hawkey"],"firstnames":["Kirstie"],"suffixes":[]},{"propositions":[],"lastnames":["Sotirakopoulos"],"firstnames":["Andreas"],"suffixes":[]},{"propositions":[],"lastnames":["Velez-Rojas"],"firstnames":["Maria"],"suffixes":[]},{"propositions":[],"lastnames":["Beznosov"],"firstnames":["Konstantin"],"suffixes":[]}],"booktitle":"Proceedings of the Seventh Symposium on Usable Privacy and Security","pages":"1–20","bibbase_note":"<span style=\"color: red\">Best Paper Award</span>, acceptance rate: 33%,","year":"2011","bibtex":"@inproceedings{jaferian2011heuristics,\n title={Heuristics for evaluating IT security management tools},\n author={Jaferian, Pooya and Hawkey, Kirstie and Sotirakopoulos, Andreas and Velez-Rojas, Maria and Beznosov, Konstantin},\n booktitle={Proceedings of the Seventh Symposium on Usable Privacy and Security},\n pages={1--20},\n bibbase_note = {<span style=\"color: red\">Best Paper Award</span>, acceptance rate: 33%,},\n year={2011}\n}\n\n","author_short":["Jaferian, P.","Hawkey, K.","Sotirakopoulos, A.","Velez-Rojas, M.","Beznosov, K."],"key":"jaferian2011heuristics","id":"jaferian2011heuristics","bibbaseid":"jaferian-hawkey-sotirakopoulos-velezrojas-beznosov-heuristicsforevaluatingitsecuritymanagementtools-2011","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/M8Cusi6NcZNqEmNN7","dataSources":["gdEygGa34uWkjynDQ","ikcgcNLWkPYd7asYj","WjyYKjDEeDNZ5D7kg","YAZ3EPKt9iuMHML8Y","Z66AwpjqbyDaCRuAz","vzLiYoozjbMtpq3bv","yyg88BndAbrgER4pG","qxYmJrWKptQFZpZn2","uXASf7FkwMkTdi7XQ","L3Q9QEq5gEyYsbhX8","PCm8nFZLWR38NRiRu","jagWcnNcoBLvejBcm","8cHa97bWQybuQhHDo","Kx35bmNmuB9SWebed","M5QirAZCjcxYLMFLM","BpNnApTKxApG4JxkD","BuaeMqxTDRXAZtmNe","r8QoBNxamnpCZ3Dwb"],"keywords":[],"search_terms":["heuristics","evaluating","security","management","tools","jaferian","hawkey","sotirakopoulos","velez-rojas","beznosov"],"title":"Heuristics for evaluating IT security management tools","year":2011}