A case study of enterprise identity management system adoption in an insurance organization
暂无分享,去创建一个
Kirstie Hawkey | Konstantin Beznosov | Pooya Jaferian | David Botta | K. Hawkey | K. Beznosov | David Botta | P. Jaferian
[1] R. Stake. The art of case study research , 1995 .
[2] Wayne G. Lutters,et al. Network authentication using single sign-on: the challenge of aligning mental models , 2008, CHiMiT '08.
[3] Kirstie Hawkey,et al. Security practitioners in context: their activities and interactions , 2008, Int. J. Hum. Comput. Stud..
[4] Lorrie Faith Cranor,et al. Security and Usability: Designing Secure Systems that People Can Use , 2005 .
[5] Kasia Muldner,et al. Human, organizational, and technological factors of IT security , 2008, CHI Extended Abstracts.
[6] Vijayalakshmi Atluri,et al. The role mining problem: finding a minimal descriptive set of roles , 2007, SACMAT '07.
[7] Kirstie Hawkey,et al. An integrated view of human, organizational, and technological challenges of IT security management , 2009, Inf. Manag. Comput. Secur..
[8] Lujo Bauer,et al. Real life challenges in access-control management , 2009, CHI.
[9] Eben M. Haber. Security Administration Tools and Practices , 2005 .
[10] Kirstie Hawkey,et al. Guidelines for designing IT security management tools , 2008, CHiMiT '08.
[11] Konstantin Beznosov,et al. Towards understanding IT security professionals and their tools , 2007, SOUPS '07.