A survey on information visualization for network and service management
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …
Systematic literature review on usability of firewall configuration
A Voronkov, LH Iwaya, LA Martucci… - ACM Computing Surveys …, 2017 - dl.acm.org
Firewalls are network security components that handle incoming and outgoing network
traffic based on a set of rules. The process of correctly configuring a firewall is complicated …
traffic based on a set of rules. The process of correctly configuring a firewall is complicated …
Collective information practice: Exploring privacy and security as social and cultural phenomena
P Dourish, K Anderson - Human-computer interaction, 2006 - Taylor & Francis
As everyday life is increasingly conducted online, and as the electronic world continues to
move out into the physical, the privacy of information and action and the security of …
move out into the physical, the privacy of information and action and the security of …
Value conflicts for information security management
A business's information is one of its most important assets, making the protection of
information a strategic issue. In this paper, we investigate the tension between information …
information a strategic issue. In this paper, we investigate the tension between information …
The information security policy unpacked: A critical study of the content of university policies
NF Doherty, L Anastasakis, H Fulford - International journal of information …, 2009 - Elsevier
Ensuring the security of corporate information, that is increasingly stored, processed and
disseminated using information and communications technologies [ICTs], has become an …
disseminated using information and communications technologies [ICTs], has become an …
Danger is in the eye of the beholders: Social representations of Information Systems security in healthcare
E Vaast - The Journal of Strategic Information Systems, 2007 - Elsevier
This paper investigates the social representations of Information Systems (IS) security of
different communities working in a healthcare organization. It considers questions of IS …
different communities working in a healthcare organization. It considers questions of IS …
Addressing the privacy paradox through personalized privacy notifications
CB Jackson, Y Wang - Proceedings of the ACM on interactive, mobile …, 2018 - dl.acm.org
Privacy behaviors of individuals are often inconsistent with their stated attitudes, a
phenomenon known as the" privacy paradox." These inconsistencies may lead to …
phenomenon known as the" privacy paradox." These inconsistencies may lead to …
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social
engineering and tend to know very little about security technology and policies. This paper …
engineering and tend to know very little about security technology and policies. This paper …
Privacy-enhancing technologies
Y Wang - Handbook of research on social and organizational …, 2009 - igi-global.com
Abstract Privacy-enhancing technologies (PETs), which constitute a wide array of technical
means for protecting users' privacy, have gained considerable momentum in both academia …
means for protecting users' privacy, have gained considerable momentum in both academia …
Social navigation as a model for usable security
P DiGioia, P Dourish - Proceedings of the 2005 symposium on Usable …, 2005 - dl.acm.org
As interest in usable security spreads, the use of visual approaches in which the functioning
of a distributed system is made visually available to end users is an approach that a number …
of a distributed system is made visually available to end users is an approach that a number …