HCI Bibliography Home | HCI Conferences | CHIMIT Archive | Detailed Records | RefWorks | EndNote | Hide Abstracts
CHIMIT Tables of Contents: 0708091011

Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology

Fullname:Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology
Editors:Eben Haber; Wayne Lutters; Wendy Lucas; Jhilmil Jain; Kirstie Hawkey
Location:Baltimore, Maryland
Dates:2009-Nov-07 to 2009-Nov-08
Publisher:ACM
Standard No:ISBN: 1-60558-572-6, 978-1-60558-572-7; ACM DL: Table of Contents hcibib: CHIMIT09
Papers:12
Pages:70
Links:Conference Home Page
System administrators as broker technicians BIBAFull-Text 1
  Nicole F. Velasquez; Suzanne P. Weisband
This research investigates the work practices of system administrators. Using semi-structured interviews and an analysis of existing system administrator literature, we theorize that system administrators act as technical brokers who bridge two communities, the end users they support and their own technical community. We also show that system administrators, like other technical workers, rely on contextual knowledge. This knowledge is largely acquired through practice and less through formal education and certification. Through a discussion of common reactive and proactive system administrator duties, we present system administrators as broker technicians who must mediate between the end users they support and their technical community. We end with a discussion of the changing role of sysadmins as their tools and users get more sophisticated.
Scripting practices in complex systems management BIBAFull-Text 2
  Eser Kandogan; Paul P. Maglio; Eben M. Haber; John H. Bailey
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In short, they engage in end-user programming activities in support of their systems management work. We examined system administrator practices in software tool development, operations, and maintenance based on ethnographic field studies at service delivery centers and data centers across the United States. Our findings suggest that software practices were mostly informal and collaborative and mixed within formal change processes; tool development and debugging were interleaved with tool use and maintenance as they interacted with live systems; and the complexity of large-scale systems and the risks involved in changing live and critical systems put increased demands on system administrators. We argue that system administrators might benefit from certain software engineering methodologies such as agile software development and software modeling.
Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations BIBAFull-Text 3
  Florian Mansmann; Fabian Fischer; Daniel A. Keim; Stephen C. North
Network security depends heavily on automated Intrusion Detection Systems (IDS) to sense malicious activity. Unfortunately, IDS often deliver both too much raw information, and an incomplete local picture, impeding accurate assessment of emerging threats. We propose a system to support analysis of IDS logs, that visually pivots large sets of Net-Flows. In particular, two visual representations of the flow data are compared: a TreeMap visualization of local network hosts, which are linked through hierarchical edge bundles with the external hosts, and a graph representation using a force-directed layout to visualize the structure of the host communication patterns. Three case studies demonstrate the capabilities of our tool to 1) analyze service usage in a managed network, 2) detect a distributed attack, and 3) investigate hosts in our network that communicate with suspect external IPs.
Network stack diagnosis and visualization tool BIBAFull-Text 4
  Krist Wongsuphasawat; Pornpat Artornsombudh; Bao Nguyen; Justin McCann
End users are often frustrated by unexpected problems while using networked software, leading to frustrated calls to the help desk seeking solutions. However, trying to locate the cause of these unexpected behaviors is not a simple task. The key to many network monitoring and diagnosis approaches is using cross-layer information, but the complex interaction between network layers and usually large amount of collected data prevent IT support personnel from determining the root of errors and bottlenecks. There is a need for the tools that reduce the amount of data to be processed, offer a systematic exploration of the data, and assist whole-stack performance analysis.
   In this paper, we present Visty, a network stack visualization tool that allows IT support personnel to systematically explore network activities at end hosts. Visty can provide an overview picture of the network stack at any specified time, showing how errors in one layer affect the performance of others. Visty was designed as a prototype for more advanced diagnosis tools, and also may be used to assist novice users in understanding the network stack and relationships between each layer.
Soramame: what you see is what you control access control user interface BIBAFull-Text 5
  Nachi Ueno; Ryota Hashimoto; Michio Shimomura; Kenji Takahashi
We discuss the design of a novel tool for usable and secure access control named Soramame. We focused on the user problem of creating a mental model of access control. To help better create mental models, we propose using Soramame. Soramame is a WYSWYC (What You See is What You Control) access control user interface. It extracts and visualizes the data-flows of access control policies and uses animation to help users better understand the policies.
An intelligent contextual support system for intrusion detection tasks BIBAFull-Text 6
  Balaji Rajendran; Dnyanesh Pawar
The cognitively challenging task of Intrusion Detection, undertaken by Network Security Engineers (NSE) even through a sophisticated Intrusion Detection System (IDS), demands considerable effort and time in figuring out the real intrusion attempts. We believe that a support system providing contextual assistance in the task of Intrusion detection would be of immense help to the Network Security Engineers. In this paper, we discuss about the features and mechanisms of such an intelligent contextual support system, along with the implementation and quantitative evaluation of it by using certain observable parameters of performance. The results indicated improvement in the productivity of the NSE and also the usability of the IDS.
A case study of enterprise identity management system adoption in an insurance organization BIBAFull-Text 7
  Pooya Jaferian; David Botta; Kirstie Hawkey; Konstantin Beznosov
This case study describes the adoption of an enterprise identity management (IdM) system in an insurance organization. We describe the state of the organization before deploying the IdM system, and point out the challenges in its IdM practices. We describe the organization's requirements for an IdM system, why a particular solution was chosen, issues in the deployment and configuration of the solution, the expected benefits, and the new challenges that arose from using the solution. Throughout, we identify practical problems that can be the focus of future research and development efforts. Our results confirm and elaborate upon the findings of previous research, contributing to an as-yet immature body of cases about IdM. Furthermore, our findings serve as a validation of our previously identified guidelines for IT security tools in general.
Storage administration: field findings and software design guidelines BIBAFull-Text 8
  Lance Bloom; Nancy Clark
This paper reports field research of Enterprise Storage Administration. We observed that Storage Administration was complex and not always optimally supported by software tools. The findings highlight Storage Administrator work practices and challenges, and inform guidelines for designing software tools that support Storage Administrators' work.
Self service technologies: eliminating pain points of traditional call centers BIBAFull-Text 9
  Jakita O. Thomas; Yolanda A. Rankin; Neil Boyette
Traditional call centers have become one of the primary means for providing customer support. Customer Service Representatives (CSRs) offer personalized attention to each customer via the telephone as the CSR interfaces with technology and customers to resolve customers' requests. Because call centers are expensive, labor intensive, and produce latency during periods of high call volume, businesses utilize web-based Self Service Technologies (SSTs) to minimize costs, provide readily available resources as needed, and reduce latency while simultaneously serving multiple customers. However, web-based SSTs have their own share of challenges which can impede service quality. To better understand the painful front stage experiences attributed to traditional call centers, we conduct content analysis of interactions between CSRs and customers. Results provide a design framework for web-based customer support SSTs that eliminate the pain points attributed to traditional call centers and address the shortcoming of web-based SSTs.
Wiki anxiety: impediments to implementing wikis for IT support groups BIBAFull-Text 10
  Kevin F. White; David Gurzick; Wayne G. Lutters
As web technologies have flourished, the workplace has become inundated with new, often-overlapping applications meant to assist busy employees with information management and collaboration. IT departments seeking to implement these systems encounter difficulties in determining which to use. This paper reports on the impediments that arose as a result of the installation of a knowledge sharing wiki in tandem with other knowledge sharing tools within six school technology departments. Analysis of the use and perception of the wiki revealed two prevalent issues: concern over achieving a critical mass of content and anxiety over potential unintended/unexpected content changes.
Tools needed to build PB sized storage systems BIBFull-Text 11
  Ray Paden
Splunk, innovation behind BIBFull-Text 12
  Johnvey Hwang