David Botta

According to our database1, David Botta authored at least 11 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Framework for Robust Localization of UUVs and Mapping of Net Pens.
CoRR, 2024

2011
Toward understanding distributed cognition in IT security management: the role of cues and norms.
Cogn. Technol. Work., 2011

The Cursor as an Artistic Expression in Jeddah.
Proceedings of the Entertainment Computing - ICEC 2011 - 10th International Conference, 2011

2009
Security practitioners in context: Their activities and interactions with other stakeholders within organizations.
Int. J. Hum. Comput. Stud., 2009

A multi-method approach for user-centered design of identity management systems.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

A case study of enterprise identity management system adoption in an insurance organization.
Proceedings of the 3rd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2009

2008
Guidelines for designing IT security management tools.
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2008

Human, organizational, and technological factors of IT security.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Detecting, analyzing and responding to security incidents: a qualitative analysis.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Towards understanding IT security professionals and their tools.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

1998
Lotus Spring.
Proceedings of the ACM SIGGRAPH 98 Conference Abstracts and Applications, 1998


  Loading...