Hackers vs. testers: A comparison of software vulnerability discovery processes

D Votipka, R Stevens, E Redmiles, J Hu… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Identifying security vulnerabilities in software is a critical task that requires significant human
effort. Currently, vulnerability discovery is often the responsibility of software testers before …

A human capital model for mitigating security analyst burnout

SC Sundaramurthy, AG Bardas, J Case, X Ou… - Eleventh symposium on …, 2015 - usenix.org
Security Operation Centers (SOCs) are being operated by universities, government
agencies, and corporations to defend their enterprise networks in general and in particular …

Keepers of the machines: Examining how system administrators manage software updates for multiple machines

F Li, L Rogers, A Mathur, N Malkin… - Fifteenth Symposium on …, 2019 - usenix.org
Keeping machines updated is crucial for maintaining system security. While recent studies
have investigated the software updating practices of end users, system administrators have …

Turning contradictions into innovations or: How we learned to stop whining and improve security operations

SC Sundaramurthy, J McHugh, X Ou, M Wesch… - Twelfth Symposium on …, 2016 - usenix.org
Efforts to improve the efficiency of security operation centers (SOCs) have emphasized
building tools for analysts or understanding the human and organizational factors involved …

Heuristics for evaluating IT security management tools

P Jaferian, K Hawkey, A Sotirakopoulos… - Proceedings of the …, 2011 - dl.acm.org
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods,
making heuristic evaluation attractive. However, standard usability heuristics are hard to …

Not as easy as just update: Survey of System Administrators and Patching Behaviours

ADG Jenkins, L Liu, MK Wolters, K Vaniea - Proceedings of the CHI …, 2024 - dl.acm.org
Patching software theoretically leads to improvements including security critical changes,
but it can also lead to new issues. For System Administrators (sysadmins) new issues can …

A tale of three security operation centers

SC Sundaramurthy, J Case, T Truong… - Proceedings of the …, 2014 - dl.acm.org
Security researchers have been trying to understand functioning of a security operation
center (SOC) and how security analysts perform their job. This effort is motivated by the fact …

But is it exploitable? Exploring how router vendors manage and patch security vulnerabilities in consumer-grade routers

G Chalhoub, A Martin - Proceedings of the 2023 European Symposium …, 2023 - dl.acm.org
Millions of consumer-grade routers are vulnerable to security attacks. Router network attacks
are dangerous and infections, presenting a serious security threat. They account for 80% of …

Encouraging knowledge contribution in IT support: social context and the differential effects of motivation type

X Wang, PF Clay, N Forsgren - Journal of Knowledge Management, 2015 - emerald.com
Purpose–This paper aims to investigate how to promote two types of knowledge contribution
tasks. The authors focus on the role of supervisor and coworker support on motivation, and …

The role of continuous delivery in IT and organizational performance

N Forsgren, J Humble - Forsgren, N., J. Humble (2016)." The Role …, 2016 - papers.ssrn.com
This study investigates the impacts of continuous delivery practices in organizations.
Continuous delivery is a set of practices designed to optimize the process of taking changes …