An Anthropological Study of Security Operations Centers to Improve Operational Efficiency
暂无分享,去创建一个
[1] D. Hymes. Foundations in Sociolinguistics: An Ethnographic Approach , 1974 .
[2] I. Nonaka. A Dynamic Theory of Organizational Knowledge Creation , 1994 .
[3] Y. Engeström,et al. Learning by expanding: An activity-theoretical approach to developmental research , 2014 .
[4] A. Strauss,et al. Basics of qualitative research: Grounded theory procedures and techniques. , 1993 .
[5] John McHugh,et al. Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations , 2016, SOUPS.
[6] Etienne Wenger,et al. Situated Learning: Legitimate Peripheral Participation , 1991 .
[7] Reijo Miettinen,et al. Perspectives on activity theory: Frontmatter , 1999 .
[8] Cher Ping Lim,et al. An activity theory approach to research of ICT integration in Singapore schools , 2003, Comput. Educ..
[9] K. Kuutti. Activity theory as a potential framework for human-computer interaction research , 1995 .
[10] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[11] Y. Engeström,et al. Expansive Learning at Work: Toward an activity theoretical reconceptualization , 2001 .
[12] C. Geertz. "From the Native's Point of View": On the Nature of Anthropological Understanding , 1974 .
[13] L. Johnston. Template analysis. , 1987, Journal of clinical orthodontics : JCO.
[14] Françoise Blin. CALL and the development of learner autonomy: Towards an activity-theoretical perspective , 2004, ReCALL.
[15] John McHugh,et al. A Human Capital Model for Mitigating Security Analyst Burnout , 2015, SOUPS.
[16] L. S. Vygotksy. Mind in society: the development of higher psychological processes , 1978 .
[17] Erik W. Driessen,et al. Using activity theory to study cultural complexity in medical education , 2014, Perspectives on medical education.
[18] Claudine Bonneau. Contradictions and their concrete manifestations : an activity-theoretical analysis of the intra-organizational co-configuration of open source software , 2013 .
[19] Donna L. Russell,et al. Understanding Innovation in Education Using Activity Theory , 2005, J. Educ. Technol. Soc..
[20] Fazli Can,et al. Concepts and effectiveness of the cover-coefficient-based clustering methodology for text databases , 1990, TODS.
[21] John McHugh,et al. An Anthropological Approach to Studying CSIRTs , 2014, IEEE Security & Privacy.
[22] Kirstie Hawkey,et al. Security practitioners in context: their activities and interactions , 2008, CHI Extended Abstracts.
[23] B. Lomov. The Problem of Activity in Psychology , 1982 .
[24] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[25] Charles Puryear Nelson,et al. Contradictions in learning to write in a second language classroom: insights from radical constructivism, activity theory, and complexity theory , 2002 .
[26] Lisa C. Yamagata-Lynch,et al. Using Activity Theory to Understand the Systemic Tensions Characterizing a Technology-Rich Introductory Astronomy Course , 2002 .
[27] James Buell,et al. Learning to teach with laptops: A case study of teacher change , 2004 .
[28] E. Wardle,et al. Can Cross-Disciplinary Links Help Us Teach "Academic Discourse" in FYC?. , 2004 .
[29] Julia Elyachar,et al. BEFORE (AND AFTER) NEOLIBERALISM: Tacit Knowledge, Secrets of the Trade, and the Public Sector in Egypt , 2012 .