Abstract is missing.
- Soramame: what you see is what you control access control user interfaceNachi Ueno, Ryota Hashimoto, Michio Shimomura, Kenji Takahashi. [doi]
- Self service technologies: eliminating pain points of traditional call centersJakita O. Thomas, Yolanda A. Rankin, Neil Boyette. [doi]
- Scripting practices in complex systems managementEser Kandogan, Paul P. Maglio, Eben M. Haber, John H. Bailey. [doi]
- System administrators as broker techniciansNicole F. Velasquez, Suzanne P. Weisband. [doi]
- Network stack diagnosis and visualization toolKrist Wongsuphasawat, Pornpat Artornsombudh, Bao Nguyen, Justin McCann. [doi]
- Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representationsFlorian Mansmann, Fabian Fischer, Daniel A. Keim, Stephen C. North. [doi]
- Wiki anxiety: impediments to implementing wikis for IT support groupsKevin F. White, David Gurzick, Wayne G. Lutters. [doi]
- An intelligent contextual support system for intrusion detection tasksBalaji Rajendran, Dnyanesh Pawar. [doi]
- Storage administration: field findings and software design guidelinesLance Bloom, Nancy Clark. [doi]
- A case study of enterprise identity management system adoption in an insurance organizationPooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov. [doi]