Author: David Botta
Publication Overview
Publication period start: 2009
Number of co-authors: 10
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Werlinger,
Rodrigo,
Hawkey,
Kirstie,
Botta,
David,
Beznosov,
Konstantin
(2009):
Security practitioners in context: Their activities and interactions with other stakeholde.
In
International Journal of Human-Computer Studies,
67
(7)
pp. 584-606.
https://dx.doi.org/10.1016/j.ijhcs.2009.03.002
Hawkey,
Kirstie,
Botta,
David,
Werlinger,
Rodrigo,
Muldner,
Kasia,
Gagné,
André,
Beznosov,
Konstantin
(2008):
Human, organizational, and technological factors of IT security.
In:
Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems
April 5-10,
2008,
.
pp. 3639-3644.
https://doi.acm.org/10.1145/1358628.1358905
Botta,
David,
Werlinger,
Rodrigo,
Gagné,
André,
Beznosov,
Konstantin,
Iverson,
Lee,
Fels,
Sidney,
Fisher,
Brian D.
(2007):
Towards understanding IT security professionals and their tools.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 100-111.
https://konstantin.beznosov.net/professional/works/doi/view.php?116
Werlinger,
Rodrigo,
Botta,
David,
Beznosov,
Konstantin
(2007):
Detecting, analyzing and responding to security incidents: a qualitative analysis.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 149-150.
https://cups.cs.cmu.edu/soups/2007/posters/p149_werlinger.pdf
Jaferian,
Pooya,
Botta,
David,
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2008):
Guidelines for designing IT security management tools.
In:
Frisch,
AEleen,
Kandogan,
Eser,
Lutters,
Wayne G.,
Thornton,
James D.,
Mouloua,
Mustapha
(eds.)
CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
November 14-15,
2008,
San Diego, California, USA.
pp. 7.
https://doi.acm.org/10.1145/1477973.1477983
Jaferian,
Pooya,
Botta,
David,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2009):
A multi-method approach for user-centered design of identity management systems.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 36.
https://doi.acm.org/10.1145/1572532.1572575
Jaferian,
Pooya,
Botta,
David,
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2008):
Guidelines for designing IT security management tools.
In:
Proceedings of the 2008 Symposium on Computer Human Interaction for the Management of Information Technology
,
2008,
.
pp. 7.
https://dx.doi.org/10.1145/1477973.1477983
Jaferian,
Pooya,
Botta,
David,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2009):
A case study of enterprise identity management system adoption in an insurance organizatio.
In:
Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology
,
2009,
.
pp. 7.
https://dx.doi.org/10.1145/1641587.1641594