Kirstie Hawkey
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2017
[c49]Maha Aljohani, Jamie Blustein, Kirstie Hawkey:
Participatory design research to understand the legal and technological perspectives in designing health information technology. SIGDOC 2017: 39:1-39:3- 2016
[c48]Huiyuan Zhou, Khalid Tearo, Aniruddha Waje, Elham Alghamdi, Thamara Alves, Vinicius Ferreira, Kirstie Hawkey, Derek Reilly:
Enhancing Mobile Content Privacy with Proxemics Aware Notifications and Protection. CHI 2016: 1362-1373
[c47]Maha Aljohani, Kirstie Hawkey, James Blustein:
Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia's Personal Health Information Act. HCI (20) 2016: 91-102
[c46]Raghav V. Sampangi, Kirstie Hawkey:
Who Are You? It Depends (On What You Ask Me!): Context-Dependent Dynamic User Authentication. WAY@SOUPS 2016
[c45]Zezi Ai, Kirstie Hawkey, Stephen Brooks:
Scale-based Exploded Views: A Selection Method for Mobile Devices. HotMobile 2016: 27-32- 2015
[j15]Huiyuan Zhou, Vinicius Ferreira, Thamara Alves, Bonnie MacKay, Kirstie Hawkey, Derek F. Reilly:
Exploring Privacy Notification and Control Mechanisms for Proximity-Aware Tablets. IJMHCI 7(3): 1-19 (2015)
[c44]Huiyuan Zhou, Vinicius Ferreira, Thamara Alves, Kirstie Hawkey, Derek F. Reilly:
Somebody Is Peeking!: A Proximity and Privacy Aware Tablet Interface. CHI Extended Abstracts 2015: 1971-1976- 2014
[j14]Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov:
Heuristics for Evaluating IT Security Management Tools. Human-Computer Interaction 29(4): 311-350 (2014)
[c43]Jeevitha Mahendiran, Kirstie Hawkey, A. Nur Zincir-Heywood:
Exploring the need for visualizations in system administration tools. CHI Extended Abstracts 2014: 1429-1434
[c42]Ankur Sharma, Kirstie Hawkey:
Understanding the Tradeoffs of Mobile Device Output Modalities in Just-in-time Learning of Mechanical Tasks. MIDI 2014: 12:1-12:10- 2013
[j13]San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, Konstantin Beznosov:
Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model. ACM Trans. Internet Techn. 13(1): 2:1-2:35 (2013)
[e3]Faramarz F. Samavati, Kirstie Hawkey:
Graphics Interface 2013, GI '13, Regina, SK, Canada, May 29-31, 2013, Proceedings. Canadian Information Processing Society / ACM 2013, ISBN 978-1-4822-1680-6 [contents]- 2012
[j12]San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov:
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures. Computers & Security 31(4): 465-483 (2012)
[c41]Russell MacKenzie, Kirstie Hawkey, Kellogg S. Booth, Zhangbo Liu, Presley Perswain, Sukhveer S. Dhillon:
LACOME: a multi-user collaboration system for shared large displays. CSCW (Companion) 2012: 267-268
[c40]Kirstie Hawkey, Eben M. Haber:
GROUP workshop proposal: collaboration in managing computer systems. GROUP 2012: 321-322
[e2]Stephen Brooks, Kirstie Hawkey:
Proceedings of the Graphics Interface 2012 Conference, GI '12, Toronto, ON, Canada, May 28-30, 2012. ACM 2012, ISBN 978-1-4503-1420-6 [contents]- 2011
[j11]David Botta, Kasia Muldner, Kirstie Hawkey, Konstantin Beznosov:
Toward understanding distributed cognition in IT security management: the role of cues and norms. Cognition, Technology & Work 13(2): 121-134 (2011)
[c39]San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, Konstantin Beznosov:
OpenID-enabled browser: towards usable and secure web single sign-on. CHI Extended Abstracts 2011: 1291-1296
[c38]Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Wang, Konstantin Beznosov:
Promoting a physical security mental model for personal firewall warnings. CHI Extended Abstracts 2011: 1585-1590
[c37]Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Konstantin Beznosov:
Heuristics for evaluating IT security management tools. CHI Extended Abstracts 2011: 1633-1638
[c36]Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement Wang, Konstantin Beznosov:
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings. SOUPS 2011: 1
[c35]Andreas Sotirakopoulos, Kirstie Hawkey, Konstantin Beznosov:
On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings. SOUPS 2011: 3
[c34]San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, Konstantin Beznosov:
What makes users refuse web single sign-on?: an empirical investigation of OpenID. SOUPS 2011: 4
[c33]Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov:
Heuristics for evaluating IT security management tools. SOUPS 2011: 7- 2010
[j10]Joel Lanir, Kellogg S. Booth, Kirstie Hawkey:
The benefits of more electronic screen space on students' retention of material in classroom lectures. Computers & Education 55(2): 892-903 (2010)
[j9]Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, Konstantin Beznosov:
Preparation, detection, and analysis: the diagnostic work of IT security incident response. Inf. Manag. Comput. Security 18(1): 26-42 (2010)
[c32]Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov, Kellogg S. Booth:
Investigating an appropriate design for personal firewalls. CHI Extended Abstracts 2010: 4123-4128
[c31]Sara Motiee, Kirstie Hawkey, Konstantin Beznosov:
Investigating user account control practices. CHI Extended Abstracts 2010: 4129-4134
[c30]San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov:
OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle. Digital Identity Management 2010: 49-58
[c29]Evgeny Maksakov, Kellogg S. Booth, Kirstie Hawkey:
Whale Tank Virtual Reality. Graphics Interface 2010: 185-192
[c28]San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, Konstantin Beznosov:
A billion keys, but few locks: the crisis of web single sign-on. NSPW 2010: 61-72
[c27]Fahimeh Raja, Kirstie Hawkey, Pooya Jaferian, Konstantin Beznosov, Kellogg S. Booth:
It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls. SafeConfig 2010: 53-62
[c26]Sara Motiee, Kirstie Hawkey, Konstantin Beznosov:
Do windows users follow the principle of least privilege?: investigating user account control practices. SOUPS 2010
2000 – 2009
- 2009
[j8]Rodrigo Werlinger, Kirstie Hawkey, David Botta, Konstantin Beznosov:
Security practitioners in context: Their activities and interactions with other stakeholders within organizations. Int. J. Hum.-Comput. Stud. 67(7): 584-606 (2009)
[j7]Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov:
An integrated view of human, organizational, and technological challenges of IT security management. Inf. Manag. Comput. Security 17(1): 4-19 (2009)
[c25]San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov:
Secure Web 2.0 Content Sharing Beyond Walled Gardens. ACSAC 2009: 409-418
[c24]Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov:
Towards improving mental models of personal firewall users. CHI Extended Abstracts 2009: 4633-4638
[c23]Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov:
A case study of enterprise identity management system adoption in an insurance organization. CHIMIT 2009
[c22]San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov:
Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens. CSE (4) 2009: 979-984
[c21]Kirstie Hawkey:
Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0. CSE (4) 2009: 990-995
[c20]Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, Konstantin Beznosov:
Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents. HAISA 2009: 119-134
[c19]Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov:
A multi-method approach for user-centered design of identity management systems. SOUPS 2009
[c18]Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov:
Revealing hidden context: improving mental models of personal firewall users. SOUPS 2009
[e1]Eben M. Haber, Wayne G. Lutters, Wendy T. Lucas, Jhilmil Jain, Kirstie Hawkey:
Proceedings of the 3rd ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT 2009, Baltimore, Maryland, USA, November 7-8, 2009. ACM 2009, ISBN 978-1-60558-572-7 [contents]- 2008
[j6]Melanie Kellar, Kirstie Hawkey, Kori M. Inkpen, Carolyn R. Watters:
Challenges of Capturing Natural Web-Based User Behaviors. Int. J. Hum. Comput. Interaction 24(4): 385-409 (2008)
[j5]Kirstie Hawkey, Kasia Muldner, Konstantin Beznosov:
Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs. IEEE Internet Computing 12(3): 22-30 (2008)
[j4]Desney S. Tan, Darren Gergle, Regan L. Mandryk, Kori Inkpen, Melanie Kellar, Kirstie Hawkey, Mary Czerwinski:
Using job-shop scheduling tasks for evaluating collocated collaboration. Personal and Ubiquitous Computing 12(3): 255-267 (2008)
[c17]Kirstie Hawkey, David Botta, Rodrigo Werlinger, Kasia Muldner, André Gagné, Konstantin Beznosov:
Human, organizational, and technological factors of IT security. CHI Extended Abstracts 2008: 3639-3644
[c16]Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov:
Security practitioners in context: their activities and interactions. CHI Extended Abstracts 2008: 3789-3794
[c15]Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov:
Guidelines for designing IT security management tools. CHIMIT 2008: 7
[c14]Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov:
Human, Organizational and Technological Challenges of Implementing IT Security in Organizations. HAISA 2008: 35-47
[c13]Kirstie Hawkey:
Exploring a human centered approach to managing visual privacy concerns during collaboration. HCC 2008: 69-76
[c12]Rodrigo Werlinger, Kirstie Hawkey, Kasia Muldner, Pooya Jaferian, Konstantin Beznosov:
The challenges of using an intrusion detection system: is it worth the effort? SOUPS 2008: 107-118- 2007
[j3]Andy Edmonds, Kirstie Hawkey, B. J. Jansen, Melanie Kellar, Don Turnbull:
Editorial. J. Web Eng. 6(3): 193-195 (2007)
[c11]Kirstie Hawkey, Kori M. Inkpen:
PrivateBits: managing visual privacy in web browsers. Graphics Interface 2007: 215-223
[c10]Jeremy P. Birnholtz, Carl Gutwin, Kirstie Hawkey:
Privacy in the open: how attention mediates awareness and privacy in open-plan offices. GROUP 2007: 51-60- 2006
[c9]Kirstie Hawkey, Kori M. Inkpen:
Keeping up appearances: understanding the dimensions of incidental information privacy. CHI 2006: 821-830
[c8]Kirstie Hawkey, Kori M. Inkpen:
Examining the content and privacy of web browsing incidental information. WWW 2006: 123-132- 2005
[j2]David Dearman, Kirstie Hawkey, Kori M. Inkpen:
Rendezvousing with location-aware devices: Enhancing social coordination. Interacting with Computers 17(5): 542-566 (2005)
[c7]Kirstie Hawkey, Kori M. Inkpen, Kenneth Rockwood, Michael McAllister, Jacob Slonim:
Requirements gathering with Alzheimer's patients and caregivers. ASSETS 2005: 142-149
[c6]Kirstie Hawkey, Kori M. Inkpen:
Privacy gradients: exploring ways to manage incidental information during co-located collaboration. CHI Extended Abstracts 2005: 1431-1434
[c5]Kirstie Hawkey, Kori Inkpen:
Web browsing today: the impact of changing contexts on user activity. CHI Extended Abstracts 2005: 1443-1446
[c4]Melanie Kellar, Derek F. Reilly, Kirstie Hawkey, Malcolm E. Rodgers, Bonnie MacKay, David Dearman, Vicki Ha, W. Joseph MacInnes, Michael N. Nunes, Karen Parker, Tara Whalen, Kori M. Inkpen:
It's a jungle out there: practical considerations for evaluation in the city. CHI Extended Abstracts 2005: 1533-1536
[c3]David Dearman, Kirstie Hawkey, Kori M. Inkpen:
Effect of location-awareness on rendezvous behaviour. CHI Extended Abstracts 2005: 1929-1932
[c2]Kirstie Hawkey, Melanie Kellar, Derek F. Reilly, Tara Whalen, Kori M. Inkpen:
The proximity factor: impact of distance on co-located collaboration. GROUP 2005: 31-40- 2004
[c1]Kirstie Hawkey, Melanie Kellar, Bonnie MacKay, Karen Parker, Derek F. Reilly:
From cookies to puppies to athletes: designing a visual audience voting system. CHI Extended Abstracts 2004: 1641-1645- 2002
[j1]Theodore Chiasson, Kirstie Hawkey, Michael McAllister, Jacob Slonim:
An architecture in support of universal access to electronic commerce. Information & Software Technology 44(5): 279-289 (2002)
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2017-11-07 22:48 CET by the dblp team



Google
Google Scholar
MS Academic
CiteSeerX
CORE
Semantic Scholar