{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:37Z","timestamp":1750307617270,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,11,14]],"date-time":"2008-11-14T00:00:00Z","timestamp":1226620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["STPGP 322192-05"],"award-info":[{"award-number":["STPGP 322192-05"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,11,14]]},"DOI":"10.1145\/1477973.1477983","type":"proceedings-article","created":{"date-parts":[[2008,12,17]],"date-time":"2008-12-17T14:47:02Z","timestamp":1229525222000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Guidelines for designing IT security management tools"],"prefix":"10.1145","author":[{"given":"Pooya","family":"Jaferian","sequence":"first","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"David","family":"Botta","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"Fahimeh","family":"Raja","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"Kirstie","family":"Hawkey","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]}],"member":"320","published-online":{"date-parts":[[2008,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.8"},{"key":"e_1_3_2_1_2_1","volume-title":"Making Sense of Qualitative Data: Complementary Research Strategies","author":"Amanda Jane Coffey P. A. A.","year":"1996","unstructured":"P. A. A. Amanda Jane Coffey . Making Sense of Qualitative Data: Complementary Research Strategies . SAGE Publications , 1996 . P. A. A. Amanda Jane Coffey. Making Sense of Qualitative Data: Complementary Research Strategies. SAGE Publications, 1996."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.06.005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/345513.345271"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029217"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2004.11.001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031672"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(05)70235-X"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280693"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(03)00287-1"},{"key":"e_1_3_2_1_11_1","volume-title":"Constructing Grounded Theory. SAGE publications","author":"Charmaz K.","year":"2006","unstructured":"K. Charmaz . Constructing Grounded Theory. SAGE publications , 2006 . K. Charmaz. Constructing Grounded Theory. SAGE publications, 2006."},{"key":"e_1_3_2_1_12_1","volume-title":"SOUPS Workshop on Usable IT Security Management (USM)","author":"Chiasson S.","year":"2007","unstructured":"S. Chiasson , P. C. van Oorschot , and R. Biddle . Even experts deserve usable security: Design guidelines for security management systems . In SOUPS Workshop on Usable IT Security Management (USM) , Pittsburgh, PA , July 2007 . S. Chiasson, P. C. van Oorschot, and R. Biddle. Even experts deserve usable security: Design guidelines for security management systems. In SOUPS Workshop on Usable IT Security Management (USM), Pittsburgh, PA, July 2007."},{"key":"e_1_3_2_1_13_1","volume-title":"SAGE Publications","author":"Creswell J. W.","year":"1997","unstructured":"J. W. Creswell . Qualitative Inquiry and Research Design: Choosing among Five Traditions . SAGE Publications , July 1997 . J. W. Creswell. Qualitative Inquiry and Research Design: Choosing among Five Traditions. SAGE Publications, July 1997."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073011"},{"key":"e_1_3_2_1_15_1","volume-title":"June","author":"Dijker B.","year":"2006","unstructured":"B. Dijker . A day in the life of system administrators. http:\/\/sageweb.sage.org , June 2006 . B. Dijker. A day in the life of system administrators. http:\/\/sageweb.sage.org, June 2006."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199711)48:11%3C1023::AID-ASI5%3E3.0.CO;2-Y"},{"key":"e_1_3_2_1_17_1","first-page":"69","volume-title":"HAISA '08: Human Aspects of Information Security and Assurance","author":"Gagn\u00e9 A.","year":"2008","unstructured":"A. Gagn\u00e9 , K. Muldner , and K. Beznosov . Identifying differences between security and other IT professionals: a qualitative analysis . In HAISA '08: Human Aspects of Information Security and Assurance , pages 69 -- 80 , Plymouth, England, July 8--9 2008 . A. Gagn\u00e9, K. Muldner, and K. Beznosov. Identifying differences between security and other IT professionals: a qualitative analysis. In HAISA '08: Human Aspects of Information Security and Assurance, pages 69--80, Plymouth, England, July 8--9 2008."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1201\/1079\/43855.31.6.20031201\/78849.3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1097\/00001888-200603000-00003"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234774"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/962752.962971"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358905"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.61"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234787"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/365024.365118"},{"key":"e_1_3_2_1_26_1","first-page":"357","volume-title":"Security and Usability: Designing Secure Systems that People Can Use","author":"Kandogan E.","year":"2005","unstructured":"E. Kandogan and E. M. Haber . Security administration tools and practices . In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use , chapter 18, pages 357 -- 378 . O'Reilly Media, Inc. , 2005 . E. Kandogan and E. M. Haber. Security administration tools and practices. In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use, chapter 18, pages 357--378. O'Reilly Media, Inc., 2005."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272516.1272521"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1"},{"key":"e_1_3_2_1_30_1","volume-title":"Dept. of Health and Human Services","author":"Koyani S. J.","year":"2006","unstructured":"S. J. Koyani , R. W. Bailey , and J. R. Nall . Research-Based Web Design & Usability Guidelines. U.S . Dept. of Health and Human Services , 2006 . S. J. Koyani, R. W. Bailey, and J. R. Nall. Research-Based Web Design & Usability Guidelines. U.S. Dept. of Health and Human Services, 2006."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2006.03.010"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179597"},{"key":"e_1_3_2_1_33_1","first-page":"1","volume-title":"2nd VoIP Security Workshop","author":"McGann S.","year":"2005","unstructured":"S. McGann and D. C. Sicker . An analysis of security threats and tools in SIP-based VoIP systems . In 2nd VoIP Security Workshop , pages 1 -- 8 , Washington DC, USA , June 2005 . S. McGann and D. C. Sicker. An analysis of security threats and tools in SIP-based VoIP systems. In 2nd VoIP Security Workshop, pages 1--8, Washington DC, USA, June 2005."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.363161"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220710831116"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00150-9"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/143457.143546"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1241889.1241898"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/646632.699608"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240807"},{"issue":"4","key":"e_1_3_2_1_42_1","first-page":"589","article-title":"Ecological interface design: theoretical foundations. Systems, Man and Cybernetics","volume":"22","author":"Vicente K.","year":"1992","unstructured":"K. Vicente and J. Rasmussen . Ecological interface design: theoretical foundations. Systems, Man and Cybernetics , IEEE Transactions on , 22 ( 4 ): 589 -- 606 , Jul\/Aug 1992 . K. Vicente and J. Rasmussen. Ecological interface design: theoretical foundations. Systems, Man and Cybernetics, IEEE Transactions on, 22(4):589--606, Jul\/Aug 1992.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.05.002"},{"key":"e_1_3_2_1_44_1","first-page":"35","volume-title":"Organizational and Technological Challenges of Implementing IT Security in Organizations. In HAISA'08: Human Aspects of Information Security and Assurance","author":"Werlinger R.","year":"2008","unstructured":"R. Werlinger , K. Hawkey , and K. Beznosov . Human , Organizational and Technological Challenges of Implementing IT Security in Organizations. In HAISA'08: Human Aspects of Information Security and Assurance , pages 35 -- 48 , Plymouth, England, July 8--9 2008 . R. Werlinger, K. Hawkey, and K. Beznosov. Human, Organizational and Technological Challenges of Implementing IT Security in Organizations. In HAISA'08: Human Aspects of Information Security and Assurance, pages 35--48, Plymouth, England, July 8--9 2008."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358931"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408679"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234793"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the Tenth Americas Conference on Information Systems","author":"Yurcik W.","year":"2003","unstructured":"W. Yurcik , J. Barlow , and J. Rosendale . Maintaining perspective on who is the enemy in the security systems administration of computer networks . In ACM CHI Workshop on System Administrators Are Users, Too. Proceedings of the Tenth Americas Conference on Information Systems , 2003 . W. Yurcik, J. Barlow, and J. Rosendale. Maintaining perspective on who is the enemy in the security systems administration of computer networks. In ACM CHI Workshop on System Administrators Are Users, Too. Proceedings of the Tenth Americas Conference on Information Systems, 2003."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189976.1189988"}],"event":{"name":"CHiMiT08: Computer Human Interaction for the Management of Information Technology","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"San Diego California","acronym":"CHiMiT08"},"container-title":["Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1477973.1477983","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1477973.1477983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:46Z","timestamp":1750250746000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1477973.1477983"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,14]]},"references-count":47,"alternative-id":["10.1145\/1477973.1477983","10.1145\/1477973"],"URL":"https:\/\/doi.org\/10.1145\/1477973.1477983","relation":{},"subject":[],"published":{"date-parts":[[2008,11,14]]},"assertion":[{"value":"2008-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}