Author: Pooya Jaferian
Publication Overview
Publication period start: 2011
Number of co-authors: 8
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Werlinger,
Rodrigo,
Hawkey,
Kirstie,
Muldner,
Kasia,
Jaferian,
Pooya,
Beznosov,
Konstantin
(2008):
The challenges of using an intrusion detection system: is it worth the effort?.
In:
Proceedings of the 2008 Symposium on Usable Privacy and Security
,
2008,
.
pp. 107-118.
https://doi.acm.org/10.1145/1408664.1408679
Jaferian,
Pooya,
Botta,
David,
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2008):
Guidelines for designing IT security management tools.
In:
Frisch,
AEleen,
Kandogan,
Eser,
Lutters,
Wayne G.,
Thornton,
James D.,
Mouloua,
Mustapha
(eds.)
CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
November 14-15,
2008,
San Diego, California, USA.
pp. 7.
https://doi.acm.org/10.1145/1477973.1477983
Jaferian,
Pooya,
Botta,
David,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2009):
A multi-method approach for user-centered design of identity management systems.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 36.
https://doi.acm.org/10.1145/1572532.1572575
Jaferian,
Pooya,
Hawkey,
Kirstie,
Sotirakopoulos,
Andreas,
Beznosov,
Konstantin
(2011):
Heuristics for evaluating IT security management tools.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 1633-1638.
https://dx.doi.org/10.1145/1979742.1979820
Jaferian,
Pooya,
Botta,
David,
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2008):
Guidelines for designing IT security management tools.
In:
Proceedings of the 2008 Symposium on Computer Human Interaction for the Management of Information Technology
,
2008,
.
pp. 7.
https://dx.doi.org/10.1145/1477973.1477983
Jaferian,
Pooya,
Botta,
David,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2009):
A case study of enterprise identity management system adoption in an insurance organizatio.
In:
Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology
,
2009,
.
pp. 7.
https://dx.doi.org/10.1145/1641587.1641594
Jaferian,
Pooya,
Hawkey,
Kirstie,
Sotirakopoulos,
Andreas,
Velez-Rojas,
Maria,
Beznosov,
Konstantin
(2011):
Heuristics for evaluating IT security management tools.
In:
Proceedings of the 2011 Symposium on Usable Privacy and Security
,
2011,
.
pp. 7.
https://dx.doi.org/10.1145/2078827.2078837