BibTex Entries for Anthropology Research Literature

@article{werlinger2009integrated,
  title={An integrated view of human, organizational, and technological challenges of IT security management},
  author={Werlinger, Rodrigo and Hawkey, Kirstie and Beznosov, Konstantin},
  journal={Information Management \& Computer Security},
  volume={17},
  number={1},
  pages={4--19},
  year={2009},
  publisher={Emerald Group Publishing Limited}
}
@inproceedings{jaferian2008guidelines,
  title={Guidelines for designing IT security management tools},
  author={Jaferian, Pooya and Botta, David and Raja, Fahimeh and Hawkey, Kirstie and Beznosov, Konstantin},
  booktitle={Proceedings of the 2nd ACM Symposium on Computer Human interaction For Management of information Technology},
  pages={7},
  year={2008},
  organization={ACM}
}
@inproceedings{werlinger2008security,
  title={Security practitioners in context: their activities and interactions},
  author={Werlinger, Rodrigo and Hawkey, Kirstie and Beznosov, Konstantin},
  booktitle={CHI'08 Extended Abstracts on Human Factors in Computing Systems},
  pages={3789--3794},
  year={2008},
  organization={ACM}
}
@inproceedings{velasquez2008work,
  title={Work practices of system administrators: implications for tool design},
  author={Velasquez, Nicole F and Weisband, Suzanne P},
  booktitle={Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology},
  pages={1},
  year={2008},
  organization={ACM}
}
@inproceedings{werlinger2008challenges,
  title={The challenges of using an intrusion detection system: is it worth the effort?},
  author={Werlinger, Rodrigo and Hawkey, Kirstie and Muldner, Kasia and Jaferian, Pooya and Beznosov, Konstantin},
  booktitle={Proceedings of the 4th symposium on Usable privacy and security},
  pages={107--118},
  year={2008},
  organization={ACM}
}
@article{botta2011toward,
  title={Toward understanding distributed cognition in IT security management: the role of cues and norms},
  author={Botta, David and Muldner, Kasia and Hawkey, Kirstie and Beznosov, Konstantin},
  journal={Cognition, Technology \& Work},
  volume={13},
  number={2},
  pages={121--134},
  year={2011},
  publisher={Springer}
}
@inproceedings{botta2007towards,
  title={Towards understanding IT security professionals and their tools},
  author={Botta, David and Werlinger, Rodrigo and Gagn{\'e}, Andr{\'e} and Beznosov, Konstantin and Iverson, Lee and Fels, Sidney and Fisher, Brian},
  booktitle={Proceedings of the 3rd symposium on Usable privacy and security},
  pages={100--111},
  year={2007},
  organization={ACM}
}
@article{werlinger2010preparation,
  title={Preparation, detection, and analysis: the diagnostic work of IT security incident response},
  author={Werlinger, Rodrigo and Muldner, Kasia and Hawkey, Kirstie and Beznosov, Konstantin},
  journal={Information Management \& Computer Security},
  volume={18},
  number={1},
  pages={26--42},
  year={2010},
  publisher={Emerald Group Publishing Limited}
}