{"id":898,"date":"2012-07-10T07:01:38","date_gmt":"2012-07-10T14:01:38","guid":{"rendered":"http:\/\/www.nadynerichmond.com\/blog\/?p=898"},"modified":"2012-07-09T18:06:21","modified_gmt":"2012-07-10T01:06:21","slug":"security-policy-management-user-study","status":"publish","type":"post","link":"https:\/\/www.nadynerichmond.com\/blog\/2012\/07\/10\/security-policy-management-user-study\/","title":{"rendered":"security policy-management user study"},"content":{"rendered":"<p>It&#8217;s research time! \u00a0In addition to the <a title=\"research participants needed\" href=\"http:\/\/www.nadynerichmond.com\/blog\/2012\/07\/02\/research-participants-needed\/\">troubleshooting study<\/a> that my team is conducting (and please, check out <a title=\"research participants needed\" href=\"http:\/\/www.nadynerichmond.com\/blog\/2012\/07\/02\/research-participants-needed\/\">my blog post<\/a> for more information, we&#8217;re still looking for participants for that), we&#8217;re also conducting research about security policies.<\/p>\n<p>My team is conducting a study next week on security policy management in a virtual infrastructure. We would like to talk to people who manage and\/or implement security policies in their virtual environment to learn about their work and get some feedback on our current initiatives. \u00a0If you are interested in participating, fill out this <a href=\"http:\/\/www.surveymonkey.com\/s\/B22JQRS\">very short survey<\/a> to answer a few questions and give us your contact information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s research time! \u00a0In addition to the troubleshooting study that my team is conducting (and please, check out my blog post for more information, we&#8217;re still looking for participants for that), we&#8217;re also conducting research about security policies. My team is conducting a study next week on security policy management in a virtual infrastructure. We &hellip; <a href=\"https:\/\/www.nadynerichmond.com\/blog\/2012\/07\/10\/security-policy-management-user-study\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">security policy-management user study<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18,20],"tags":[],"class_list":["post-898","post","type-post","status-publish","format-standard","hentry","category-ux","category-vmware"],"_links":{"self":[{"href":"https:\/\/www.nadynerichmond.com\/blog\/wp-json\/wp\/v2\/posts\/898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nadynerichmond.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nadynerichmond.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nadynerichmond.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nadynerichmond.com\/blog\/wp-json\/wp\/v2\/comments?post=898"}],"version-history":[{"count":1,"href":"https:\/\/www.nadynerichmond.com\/blog\/wp-json\/wp\/v2\/posts\/898\/revisions"}],"predecessor-version":[{"id":899,"href":"https:\/\/www.nadynerichmond.com\/blog\/wp-json\/wp\/v2\/posts\/898\/revisions\/899"}],"wp:attachment":[{"href":"https:\/\/www.nadynerichmond.com\/blog\/wp-json\/wp\/v2\/media?parent=898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nadynerichmond.com\/blog\/wp-json\/wp\/v2\/categories?post=898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nadynerichmond.com\/blog\/wp-json\/wp\/v2\/tags?post=898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}