Author: Kirstie Hawkey
Publications
Co-authors
Productive Colleagues
- Kori Inkpen
- Mary Czerwinski
- Carl Gutwin
- 70
- 80
- 116
Publications
Werlinger, Rodrigo, Hawkey, Kirstie, Botta, David, Beznosov, Konstantin (2009): Security practitioners in context: Their activities and interactions with other stakeholde. In International Journal of Human-Computer Studies, 67 (7) pp. 584-606.
Hawkey, Kirstie, Muldner, Kasia, Beznosov, Konstantin (2008): Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs. In IEEE Internet Computing, 12 (3) pp. 22-30.
Kellar, Melanie, Hawkey, Kirstie, Inkpen, Kori, Watters, Carolyn R. (2008): Challenges of Capturing Natural Web-Based User Behaviors. In International Journal of Human-Computer Interaction, 24 (4) pp. 385-409.
Tan, Desney S., Gergle, Darren, Mandryk, Regan L., Inkpen, Kori, Kellar, Melanie, Hawkey, Kirstie, Czerwinski, Mary (2008): Using job-shop scheduling tasks for evaluating collocated collaboration. In Personal and Ubiquitous Computing, 12 (3) pp. 255-267.
Dearman, David, Hawkey, Kirstie, Inkpen, Kori (2005): Rendezvousing with location-aware devices: Enhancing social coordination. In Interacting with Computers, 17 (5) pp. 542-566.
Hawkey, Kirstie, Kellar, Melanie, Reilly, Derek, Whalen, Tara, Inkpen, Kori (2005): The proximity factor: impact of distance on co-located collaboration. In: GROUP05: International Conference on Supporting Group Work November 6-9, 2005, Sanibel Island, Florida, USA. pp. 31-40.
Sun, San-Tsai, Pospisil, Eric, Muslukhov, Ildar, Dindar, Nuray, Hawkey, Kirstie, Beznosov, Konstantin (2011): OpenID-enabled browser: towards usable and secure web single sign-on. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 1291-1296.
Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin, Booth, Kellogg S. (2010): Investigating an appropriate design for personal firewalls. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 4123-4128.
Motiee, Sara, Hawkey, Kirstie, Beznosov, Konstantin (2010): Investigating user account control practices. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 4129-4134.
Maksakov, Evgeny, Booth, Kellogg S., Hawkey, Kirstie (2010): Whale Tank Virtual Reality. In: Proceedings of the 2010 Conference on Graphics Interface , 2010, . pp. 185-192.
Raja, Fahimeh, Hawkey, Kirstie, Hsu, Steven, Wang, Kai-Le, Beznosov, Konstantin (2011): Promoting a physical security mental model for personal firewall warnings. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 1585-1590.
Jaferian, Pooya, Botta, David, Hawkey, Kirstie, Beznosov, Konstantin (2009): A multi-method approach for user-centered design of identity management systems. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 36.
Jaferian, Pooya, Hawkey, Kirstie, Sotirakopoulos, Andreas, Beznosov, Konstantin (2011): Heuristics for evaluating IT security management tools. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 1633-1638.
Jaferian, Pooya, Botta, David, Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2008): Guidelines for designing IT security management tools. In: Proceedings of the 2008 Symposium on Computer Human Interaction for the Management of Information Technology , 2008, . pp. 7.
Jaferian, Pooya, Botta, David, Hawkey, Kirstie, Beznosov, Konstantin (2009): A case study of enterprise identity management system adoption in an insurance organizatio. In: Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology , 2009, . pp. 7.
MacKenzie, Russell, Hawkey, Kirstie, Booth, Kellogg S., Liu, Zhangbo, Perswain, Presley, Dhillon, Sukhveer S. (2012): LACOME: a multi-user collaboration system for shared large displays. In: Companion Proceedings of ACM CSCW12 Conference on Computer-Supported Cooperative Work , 2012, . pp. 267-268.
Raja, Fahimeh, Hawkey, Kirstie, Hsu, Steven, Wang, Kai-Le Clement, Beznosov, Konstantin (2011): A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warni. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 1.
Sotirakopoulos, Andreas, Hawkey, Kirstie, Beznosov, Konstantin (2011): On the challenges in usable security lab studies: lessons learned from replicating a study. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 3.
Sun, San-Tsai, Pospisil, Eric, Muslukhov, Ildar, Dindar, Nuray, Hawkey, Kirstie, Beznosov, Konstantin (2011): What makes users refuse web single sign-on?: an empirical investigation of OpenID. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 4.
Motiee, Sara, Hawkey, Kirstie, Beznosov, Konstantin (2010): Do windows users follow the principle of least privilege?: investigating user account cont. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 1.
Hawkey, Kirstie (2008): Exploring a human centered approach to managing visual privacy concerns during collaborati. In: Proceedings of the 2008 ACM International Workshop on Human-Centered Multimedia , 2008, . pp. 69-76.
Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2009): Revealing hidden context: improving mental models of personal firewall users. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 1.
Jaferian, Pooya, Botta, David, Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2008): Guidelines for designing IT security management tools. In: Frisch, AEleen, Kandogan, Eser, Lutters, Wayne G., Thornton, James D., Mouloua, Mustapha (eds.) CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology November 14-15, 2008, San Diego, California, USA. pp. 7.
Hawkey, Kirstie, Inkpen, Kori (2006): Keeping up appearances: understanding the dimensions of incidental information privacy. In: Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems , 2006, . pp. 821-830.
Hawkey, Kirstie, Inkpen, Kori (2006): Examining the content and privacy of web browsing incidental information. In: Proceedings of the 2006 International Conference on the World Wide Web , 2006, . pp. 123-132.
Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2009): Towards improving mental models of personal firewall users. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 4633-4638.
Werlinger, Rodrigo, Hawkey, Kirstie, Muldner, Kasia, Jaferian, Pooya, Beznosov, Konstantin (2008): The challenges of using an intrusion detection system: is it worth the effort?. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 107-118.
Birnholtz, Jeremy P., Gutwin, Carl, Hawkey, Kirstie (2007): Privacy in the open: how attention mediates awareness and privacy in open-plan offices. In: GROUP07: International Conference on Supporting Group Work , 2007, . pp. 51-60.
Werlinger, Rodrigo, Hawkey, Kirstie, Beznosov, Konstantin (2008): Security practitioners in context: their activities and interactions. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 3789-3794.
Hawkey, Kirstie, Botta, David, Werlinger, Rodrigo, Muldner, Kasia, Gagné, André, Beznosov, Konstantin (2008): Human, organizational, and technological factors of IT security. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 3639-3644.
Hawkey, Kirstie, Inkpen, Kori (2007): PrivateBits: managing visual privacy in web browsers. In: Proceedings of the 2007 Conference on Graphics Interface , 2007, . pp. 215-223.
Dearman, David, Hawkey, Kirstie, Inkpen, Kori (2005): Effect of location-awareness on rendezvous behaviour. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems , 2005, . pp. 1929-1932.
Kellar, Melanie, Reilly, Derek, Hawkey, Kirstie, Rodgers, Malcolm, MacKay, Bonnie, Dearman, David, Ha, Vicki, MacInnes, W. Joseph, Nunes, Michael, Parker, Karen, Whalen, Tara, Inkpen, Kori (2005): It\'s a jungle out there: practical considerations for evaluation in the city. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems , 2005, . pp. 1533-1536.
Hawkey, Kirstie, Inkpen, Kori (2005): Web browsing today: the impact of changing contexts on user activity. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems , 2005, . pp. 1443-1446.
Hawkey, Kirstie, Inkpen, Kori (2005): Privacy gradients: exploring ways to manage incidental information during co-located colla. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems , 2005, . pp. 1431-1434.
Hawkey, Kirstie, Inkpen, Kori, Rockwood, Kenneth, McAllister, Michael, Slonim, Jacob (2005): Requirements gathering with alzheimer\'s patients and caregivers. In: Seventh Annual ACM Conference on Assistive Technologies , 2005, . pp. 142-149.
Jaferian, Pooya, Hawkey, Kirstie, Sotirakopoulos, Andreas, Velez-Rojas, Maria, Beznosov, Konstantin (2011): Heuristics for evaluating IT security management tools. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 7.