skip to main content
10.1145/1280680.1280693acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Towards understanding IT security professionals and their tools

Authors Info & Claims
Published:18 July 2007Publication History

ABSTRACT

We report preliminary results of our ongoing field study of IT professionals who are involved in security management. We interviewed a dozen practitioners from five organizations to understand their workplace and tools. We analyzed the interviews using a variation of Grounded Theory and predesigned themes. Our results suggest that the job of IT security management is distributed across multiple employees, often affiliated with different organizational units or groups within a unit and responsible for different aspects of it. The workplace of our participants can be characterized by their responsibilities, goals, tasks, and skills. Three skills stand out as significant in the IT security management workplace: inferential analysis, pattern recognition, and bricolage.

References

  1. Argus intrusion detection and prevention. http://www.qosient.com/argus/, February 2007.Google ScholarGoogle Scholar
  2. R. Barrett, E. Haber, E. Kandogan, P. Maglio, M. Prabaker, and L. Takayama. Field studies of computer system administrators: Analysis of system management tools and practices. In Proceedings of the Conference on Computer Supported Collaborative Work, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Bartels, B. J. Holmes, and H. Lo. Global IT spending and investment forecast, 2006 to 2007. Forrester Research, 2006.Google ScholarGoogle Scholar
  4. F. J. Börck. Discovering Information Security Management. Doctoral thesis, Stockholm University, Royal Institute of Technology, 2005.Google ScholarGoogle Scholar
  5. S. Bodker. Human activity and human-computer interaction. In S. Bodker, editor, Through the Interface: A Human Activity Approach to User Interface Design, pages 18--56. Lawrence Erlbaum Associates, Publishers, Hillsdale, NJ, 1991.Google ScholarGoogle Scholar
  6. H. H. Clark. Using Language. Cambridge University Press, Cambridge, England, 1996.Google ScholarGoogle Scholar
  7. H. H. Clark and M. F. Schober. Asking questions and influencing answers. In J. M. Tanur, editor, Questions about questions: Inquiries into the cognitive bases of surveys. Russell Sage, New York, NY, 1992.Google ScholarGoogle Scholar
  8. M. Elliott and R. Kling. Organizational usability of digital libraries: Case study of legal research in civil and criminal courts. American Society for Information Science, 4(11):1023--1035, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. G. Fischer and E. Scharff. Meta-design: design for designers. In Proceedings of the Conference on Designing Interactive Systems (DIS), pages 396--405, New York, NY, USA, 2000. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Glaser and A. L. Strauss. The Discovery of Grounded Theory, Strategies for Qualitative Research. Aldine Publishing Company, Chicago, Illinois, 1967.Google ScholarGoogle Scholar
  11. U. Holmstrom. User-centered design of secure software. In the 17th Symposium on Human Factors in Telecommunications, Denmark, 1999.Google ScholarGoogle Scholar
  12. E. Hutchins. Cognition in the Wild. MIT Press, Cambridge, MA, 1995.Google ScholarGoogle Scholar
  13. Internet relay chat (irc) help archive. http://www.irchelp.org/, February 2007.Google ScholarGoogle Scholar
  14. E. Kandogan and E. M. Haber. Security administration tools and practices. In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use, chapter 18, pages 357--378. O'Reilly Media, Inc., Sebastapol, 2005.Google ScholarGoogle Scholar
  15. K. Kark, C. McClean, L. Koetzle, J. Penn, and S. Bernhardt. 2007 security budgets increase: The transition to information risk management begins. Forrester Research, 2007.Google ScholarGoogle Scholar
  16. P. P. Maglio, E. Kandogan, and E. Haber. Distributed cognition and joint activity in collaborative problem solving. In Proceedings of the Twenty-fifth Annual Conference of the Cognitive Science Society, 2003.Google ScholarGoogle Scholar
  17. T. Malone, K. Lai, and K. Grant. Two design principles for collaboration technology: Examples of semiformal systems and radical tailorability. Coordination Theory and Collaboration Technology, pages 125--160, 2001.Google ScholarGoogle Scholar
  18. Merriam-Webster. Merriam-webster's collegiate dictionary, 1994.Google ScholarGoogle Scholar
  19. Nessus security scanner. http://www.nessus.org/, February 2007.Google ScholarGoogle Scholar
  20. J. Nielsen. Usability Engineering. Morgan Kaufmann, San Francisco, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Idea works: Qualrus software. http://www.ideaworks.com/qualrus/index.html, February 2007.Google ScholarGoogle Scholar
  22. K. J. Vicente. Cognitive Work Analysis: Toward Safe, Productive, and Healthy Computer-Based Work. Mahwah, NJ: Lawrence Erlbaum Associates, Publishers, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Wool. A quantitative study of firewall configuration errors. Computer, 37(6):62--67, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. Yin. Case study research: Design and methods (2nd ed.). Sage Publishing, Beverly Hills, CA, 1994.Google ScholarGoogle Scholar
  25. M. Zurko, R. Simon, and T. Sanfilippo. A user-centered, modular authorization service built on an RBAC foundation. In IEEE Symposium on Security and Privacy, pages 57--71, Oakland, CA, USA, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  26. M. E. Zurko and R. T. Simon. User-centered security. In New Security Paradigms Workshop, pages 27--33, Lake Arrowhead, California, 1996. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards understanding IT security professionals and their tools

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security
            July 2007
            188 pages
            ISBN:9781595938015
            DOI:10.1145/1280680

            Copyright © 2007 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 18 July 2007

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate15of49submissions,31%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader