A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

Systematic literature review on usability of firewall configuration

A Voronkov, LH Iwaya, LA Martucci… - ACM Computing Surveys …, 2017 - dl.acm.org
Firewalls are network security components that handle incoming and outgoing network
traffic based on a set of rules. The process of correctly configuring a firewall is complicated …

Collective information practice: Exploring privacy and security as social and cultural phenomena

P Dourish, K Anderson - Human-computer interaction, 2006 - Taylor & Francis
As everyday life is increasingly conducted online, and as the electronic world continues to
move out into the physical, the privacy of information and action and the security of …

Value conflicts for information security management

K Hedström, E Kolkowska, F Karlsson… - The Journal of Strategic …, 2011 - Elsevier
A business's information is one of its most important assets, making the protection of
information a strategic issue. In this paper, we investigate the tension between information …

The information security policy unpacked: A critical study of the content of university policies

NF Doherty, L Anastasakis, H Fulford - International journal of information …, 2009 - Elsevier
Ensuring the security of corporate information, that is increasingly stored, processed and
disseminated using information and communications technologies [ICTs], has become an …

Danger is in the eye of the beholders: Social representations of Information Systems security in healthcare

E Vaast - The Journal of Strategic Information Systems, 2007 - Elsevier
This paper investigates the social representations of Information Systems (IS) security of
different communities working in a healthcare organization. It considers questions of IS …

Addressing the privacy paradox through personalized privacy notifications

CB Jackson, Y Wang - Proceedings of the ACM on interactive, mobile …, 2018 - dl.acm.org
Privacy behaviors of individuals are often inconsistent with their stated attitudes, a
phenomenon known as the" privacy paradox." These inconsistencies may lead to …

Looking for trouble: understanding end-user security management

JB Gross, MB Rosson - Proceedings of the 2007 Symposium on …, 2007 - dl.acm.org
End users are often cast as the weak link in computer security; they fall victim to social
engineering and tend to know very little about security technology and policies. This paper …

Privacy-enhancing technologies

Y Wang - Handbook of research on social and organizational …, 2009 - igi-global.com
Abstract Privacy-enhancing technologies (PETs), which constitute a wide array of technical
means for protecting users' privacy, have gained considerable momentum in both academia …

Social navigation as a model for usable security

P DiGioia, P Dourish - Proceedings of the 2005 symposium on Usable …, 2005 - dl.acm.org
As interest in usable security spreads, the use of visual approaches in which the functioning
of a distributed system is made visually available to end users is an approach that a number …