Pooya Jaferian

According to our database1, Pooya Jaferian authored at least 14 papers between 2005 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Heuristics for Evaluating IT Security Management Tools.
Hum. Comput. Interact., 2014

To Befriend Or Not? A Model of Friend Request Acceptance on Facebook.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

To Authorize or Not Authorize: Helping Users Review Access Policies in Organizations.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Helping users review and make sense of access policies in organizations.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2011
Heuristics for evaluating IT security management tools.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

2009
A multi-method approach for user-centered design of identity management systems.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

A case study of enterprise identity management system adoption in an insurance organization.
Proceedings of the 3rd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2009

2008
The challenges of using an intrusion detection system: is it worth the effort?
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Guidelines for designing IT security management tools.
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2008

2007
Modeling Secure Architectural Connector with UML 2.0.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

2006
Comparison of Global Computing with Grid Computing.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

2005
RUPSec: An Extension on RUP for Developing Secure Systems - Requirements Discipline.
Proceedings of the Second World Enformatika Conference, 2005

RUPSec : Extending Business Modeling and Requirements Disciplines of RUP for Developing Secure Systems.
Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2005), 30 August, 2005


  Loading...