Developing expertise for network intrusion detection

作者: John R. Goodall , Wayne G. Lutters , Anita Komlodi

DOI: 10.1108/09593840910962186

关键词: Mailing listContext (language use)Knowledge managementComputer scienceIntrusion detection systemDescriptive knowledgeData securityInformation securitySituatedSubject-matter expert

摘要: Purpose – The paper seeks to provide a foundational understanding of the socio‐technical system that is computer network intrusion detection, including nature knowledge work, situated expertise, and processes learning as supported by information technology.Design/methodology/approach authors conducted field study explore work detection using multiple data collection methods, semi‐structured interviews, examination security tools resources, analysis mailing list posts, attendance at several domain‐specific user group meetings.Findings practice analysts involves both domain expertise networking high degree problem‐solving activities are not predefined evolve with dynamically changing context analyst's environment. This highlights process needed acquire these two types knowledge, c...

参考文章(26)
Dave Patterson, Eric Arnold Anderson, Researching system administration University of California, Berkeley. ,(2002)
Michael Polanyi, The Tacit Dimension ,(1966)
Anselm L. Strauss, Juliet M. Corbin, Basics of qualitative research : techniques and procedures for developing grounded theory Published in <b>1998</b> in Thousand Oaks (Calif.) by Sage. ,(1998)
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
Jerome S. Bruner, Acts of meaning ,(1990)
Rob Barrett, Eser Kandogan, Paul P. Maglio, Eben M. Haber, Leila A. Takayama, Madhu Prabaker, Field studies of computer system administrators: analysis of system management tools and practices conference on computer supported cooperative work. pp. 388- 395 ,(2004) , 10.1145/1031607.1031672
Brian Lings, Björn Lundell, On the adaptation of Grounded Theory procedures : insights from the evolution of the 2G method Information Technology & People. ,vol. 18, pp. 196- 211 ,(2005) , 10.1108/09593840510615842