@article{werlinger2009integrated, title={An integrated view of human, organizational, and technological challenges of IT security management}, author={Werlinger, Rodrigo and Hawkey, Kirstie and Beznosov, Konstantin}, journal={Information Management \& Computer Security}, volume={17}, number={1}, pages={4--19}, year={2009}, publisher={Emerald Group Publishing Limited} }
@inproceedings{jaferian2008guidelines, title={Guidelines for designing IT security management tools}, author={Jaferian, Pooya and Botta, David and Raja, Fahimeh and Hawkey, Kirstie and Beznosov, Konstantin}, booktitle={Proceedings of the 2nd ACM Symposium on Computer Human interaction For Management of information Technology}, pages={7}, year={2008}, organization={ACM} }
@inproceedings{werlinger2008security, title={Security practitioners in context: their activities and interactions}, author={Werlinger, Rodrigo and Hawkey, Kirstie and Beznosov, Konstantin}, booktitle={CHI'08 Extended Abstracts on Human Factors in Computing Systems}, pages={3789--3794}, year={2008}, organization={ACM} }
@inproceedings{velasquez2008work, title={Work practices of system administrators: implications for tool design}, author={Velasquez, Nicole F and Weisband, Suzanne P}, booktitle={Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology}, pages={1}, year={2008}, organization={ACM} }
@inproceedings{werlinger2008challenges, title={The challenges of using an intrusion detection system: is it worth the effort?}, author={Werlinger, Rodrigo and Hawkey, Kirstie and Muldner, Kasia and Jaferian, Pooya and Beznosov, Konstantin}, booktitle={Proceedings of the 4th symposium on Usable privacy and security}, pages={107--118}, year={2008}, organization={ACM} }
@article{botta2011toward, title={Toward understanding distributed cognition in IT security management: the role of cues and norms}, author={Botta, David and Muldner, Kasia and Hawkey, Kirstie and Beznosov, Konstantin}, journal={Cognition, Technology \& Work}, volume={13}, number={2}, pages={121--134}, year={2011}, publisher={Springer} }
@inproceedings{botta2007towards, title={Towards understanding IT security professionals and their tools}, author={Botta, David and Werlinger, Rodrigo and Gagn{\'e}, Andr{\'e} and Beznosov, Konstantin and Iverson, Lee and Fels, Sidney and Fisher, Brian}, booktitle={Proceedings of the 3rd symposium on Usable privacy and security}, pages={100--111}, year={2007}, organization={ACM} }
@article{werlinger2010preparation, title={Preparation, detection, and analysis: the diagnostic work of IT security incident response}, author={Werlinger, Rodrigo and Muldner, Kasia and Hawkey, Kirstie and Beznosov, Konstantin}, journal={Information Management \& Computer Security}, volume={18}, number={1}, pages={26--42}, year={2010}, publisher={Emerald Group Publishing Limited} }