Security practitioners in context: Their activities and interactions with other stakeholders within organizations. Werlinger, R., Hawkey, K., Botta, D., & Beznosov, K. International Journal of Human-Computer Studies, 67(7):584–606, Academic Press, Mar, 2009.
Security practitioners in context: Their activities and interactions with other stakeholders within organizations [link]Paper  doi  abstract   bibtex   
This study investigates the context of interactions of information technology (IT) security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine different activities that require interactions between security practitioners and other stakeholders, and describe in detail two of these activities that may serve as useful references for security-tool usability scenarios. We propose a model of the factors contributing to the complexity of interactions between security practitioners and other stakeholders, and discuss how this complexity is a potential source of security issues that increase the risk level within organizations. Our analysis also reveals that the tools used by our participants to perform their security tasks provide insufficient support for the complex, collaborative interactions that their duties involve. We offer several recommendations for addressing this complexity and improving IT security tools.
@Article{werlinger2009security,
  author     = {Werlinger, Rodrigo and Hawkey, Kirstie and Botta, David and Beznosov, Konstantin},
  journal    = {International Journal of Human-Computer Studies},
  title      = {{S}ecurity practitioners in context: {T}heir activities and interactions with other stakeholders within organizations},
  year       = {2009},
  month      = {Mar},
  number     = {7},
  pages      = {584--606},
  volume     = {67},
  abstract   = {This study investigates the context of interactions of information technology (IT) security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine different activities that require interactions between security practitioners and other stakeholders, and describe in detail two of these activities that may serve as useful references for security-tool usability scenarios. We propose a model of the factors contributing to the complexity of interactions between security practitioners and other stakeholders, and discuss how this complexity is a potential source of security issues that increase the risk level within organizations. Our analysis also reveals that the tools used by our participants to perform their security tasks provide insufficient support for the complex, collaborative interactions that their duties involve. We offer several recommendations for addressing this complexity and improving IT security tools.},
  doi        = {10.1016/j.ijhcs.2009.03.002},
  publisher  = {Academic Press},
  url        = {https://doi.org/10.1016/j.ijhcs.2009.03.002},
}

Downloads: 0