Author: Kirstie Hawkey
Publication Overview
Publication period start: 2011
Number of co-authors: 44
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Werlinger,
Rodrigo,
Hawkey,
Kirstie,
Botta,
David,
Beznosov,
Konstantin
(2009):
Security practitioners in context: Their activities and interactions with other stakeholde.
In
International Journal of Human-Computer Studies,
67
(7)
pp. 584-606.
https://dx.doi.org/10.1016/j.ijhcs.2009.03.002
Tan,
Desney S.,
Gergle,
Darren,
Mandryk,
Regan L.,
Inkpen,
Kori,
Kellar,
Melanie,
Hawkey,
Kirstie,
Czerwinski,
Mary
(2008):
Using job-shop scheduling tasks for evaluating collocated collaboration.
In
Personal and Ubiquitous Computing,
12
(3)
pp. 255-267.
https://dx.doi.org/10.1007/s00779-007-0154-3
Hawkey,
Kirstie,
Muldner,
Kasia,
Beznosov,
Konstantin
(2008):
Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs.
In
IEEE Internet Computing,
12
(3)
pp. 22-30.
https://dx.doi.org/10.1109/MIC.2008.61
Kellar,
Melanie,
Hawkey,
Kirstie,
Inkpen,
Kori,
Watters,
Carolyn R.
(2008):
Challenges of Capturing Natural Web-Based User Behaviors.
In
International Journal of Human-Computer Interaction,
24
(4)
pp. 385-409.
https://www.informaworld.com/10.1080/10447310801973739
Dearman,
David,
Hawkey,
Kirstie,
Inkpen,
Kori
(2005):
Rendezvousing with location-aware devices: Enhancing social coordination.
In
Interacting with Computers,
17
(5)
pp. 542-566.
https://dx.doi.org/10.1016/j.intcom.2005.03.005
Hawkey,
Kirstie,
Kellar,
Melanie,
Reilly,
Derek,
Whalen,
Tara,
Inkpen,
Kori
(2005):
The proximity factor: impact of distance on co-located collaboration.
In:
GROUP05: International Conference on Supporting Group Work
November 6-9,
2005,
Sanibel Island, Florida, USA.
pp. 31-40.
https://doi.acm.org/10.1145/1099203.1099209
Hawkey,
Kirstie,
Inkpen,
Kori
(2006):
Keeping up appearances: understanding the dimensions of incidental information privacy.
In:
Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems
,
2006,
.
pp. 821-830.
https://doi.acm.org/10.1145/1124772.1124893
Hawkey,
Kirstie,
Inkpen,
Kori,
Rockwood,
Kenneth,
McAllister,
Michael,
Slonim,
Jacob
(2005):
Requirements gathering with alzheimer\'s patients and caregivers.
In:
Seventh Annual ACM Conference on Assistive Technologies
,
2005,
.
pp. 142-149.
https://doi.acm.org/10.1145/1090785.1090812
Hawkey,
Kirstie,
Inkpen,
Kori
(2005):
Privacy gradients: exploring ways to manage incidental information during co-located colla.
In:
Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems
,
2005,
.
pp. 1431-1434.
https://doi.acm.org/10.1145/1056808.1056934
Hawkey,
Kirstie,
Inkpen,
Kori
(2005):
Web browsing today: the impact of changing contexts on user activity.
In:
Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems
,
2005,
.
pp. 1443-1446.
https://doi.acm.org/10.1145/1056808.1056937
Kellar,
Melanie,
Reilly,
Derek,
Hawkey,
Kirstie,
Rodgers,
Malcolm,
MacKay,
Bonnie,
Dearman,
David,
Ha,
Vicki,
MacInnes,
W. Joseph,
Nunes,
Michael,
Parker,
Karen,
Whalen,
Tara,
Inkpen,
Kori
(2005):
It\'s a jungle out there: practical considerations for evaluation in the city.
In:
Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems
,
2005,
.
pp. 1533-1536.
https://doi.acm.org/10.1145/1056808.1056959
Dearman,
David,
Hawkey,
Kirstie,
Inkpen,
Kori
(2005):
Effect of location-awareness on rendezvous behaviour.
In:
Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems
,
2005,
.
pp. 1929-1932.
https://doi.acm.org/10.1145/1056808.1057059
Hawkey,
Kirstie,
Inkpen,
Kori
(2007):
PrivateBits: managing visual privacy in web browsers.
In:
Proceedings of the 2007 Conference on Graphics Interface
,
2007,
.
pp. 215-223.
https://doi.acm.org/10.1145/1268517.1268553
Hawkey,
Kirstie,
Botta,
David,
Werlinger,
Rodrigo,
Muldner,
Kasia,
Gagné,
André,
Beznosov,
Konstantin
(2008):
Human, organizational, and technological factors of IT security.
In:
Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems
April 5-10,
2008,
.
pp. 3639-3644.
https://doi.acm.org/10.1145/1358628.1358905
Werlinger,
Rodrigo,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2008):
Security practitioners in context: their activities and interactions.
In:
Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems
April 5-10,
2008,
.
pp. 3789-3794.
https://doi.acm.org/10.1145/1358628.1358931
Birnholtz,
Jeremy P.,
Gutwin,
Carl,
Hawkey,
Kirstie
(2007):
Privacy in the open: how attention mediates awareness and privacy in open-plan offices.
In:
GROUP07: International Conference on Supporting Group Work
,
2007,
.
pp. 51-60.
https://doi.acm.org/10.1145/1316624.1316632
Werlinger,
Rodrigo,
Hawkey,
Kirstie,
Muldner,
Kasia,
Jaferian,
Pooya,
Beznosov,
Konstantin
(2008):
The challenges of using an intrusion detection system: is it worth the effort?.
In:
Proceedings of the 2008 Symposium on Usable Privacy and Security
,
2008,
.
pp. 107-118.
https://doi.acm.org/10.1145/1408664.1408679
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2009):
Towards improving mental models of personal firewall users.
In:
Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems
,
2009,
.
pp. 4633-4638.
https://doi.acm.org/10.1145/1520340.1520712
Hawkey,
Kirstie,
Inkpen,
Kori
(2006):
Examining the content and privacy of web browsing incidental information.
In:
Proceedings of the 2006 International Conference on the World Wide Web
,
2006,
.
pp. 123-132.
https://doi.acm.org/10.1145/1135777.1135801
Hawkey,
Kirstie
(2008):
Exploring a human centered approach to managing visual privacy concerns during collaborati.
In:
Proceedings of the 2008 ACM International Workshop on Human-Centered Multimedia
,
2008,
.
pp. 69-76.
https://doi.acm.org/10.1145/1462027.1462038
Jaferian,
Pooya,
Botta,
David,
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2008):
Guidelines for designing IT security management tools.
In:
Frisch,
AEleen,
Kandogan,
Eser,
Lutters,
Wayne G.,
Thornton,
James D.,
Mouloua,
Mustapha
(eds.)
CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
November 14-15,
2008,
San Diego, California, USA.
pp. 7.
https://doi.acm.org/10.1145/1477973.1477983
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2009):
Revealing hidden context: improving mental models of personal firewall users.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 1.
https://doi.acm.org/10.1145/1572532.1572534
Jaferian,
Pooya,
Botta,
David,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2009):
A multi-method approach for user-centered design of identity management systems.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 36.
https://doi.acm.org/10.1145/1572532.1572575
Motiee,
Sara,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2010):
Do windows users follow the principle of least privilege?: investigating user account cont.
In:
Proceedings of the 2010 Symposium on Usable Privacy and Security
,
2010,
.
pp. 1.
https://doi.acm.org/10.1145/1837110.1837112
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin,
Booth,
Kellogg S.
(2010):
Investigating an appropriate design for personal firewalls.
In:
Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems
,
2010,
.
pp. 4123-4128.
https://doi.acm.org/10.1145/1753846.1754113
Motiee,
Sara,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2010):
Investigating user account control practices.
In:
Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems
,
2010,
.
pp. 4129-4134.
https://doi.acm.org/10.1145/1753846.1754114
Maksakov,
Evgeny,
Booth,
Kellogg S.,
Hawkey,
Kirstie
(2010):
Whale Tank Virtual Reality.
In:
Proceedings of the 2010 Conference on Graphics Interface
,
2010,
.
pp. 185-192.
https://doi.acm.org/10.1145/4713060.1839247
Sun,
San-Tsai,
Pospisil,
Eric,
Muslukhov,
Ildar,
Dindar,
Nuray,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2011):
OpenID-enabled browser: towards usable and secure web single sign-on.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 1291-1296.
https://dx.doi.org/10.1145/1979742.1979763
Raja,
Fahimeh,
Hawkey,
Kirstie,
Hsu,
Steven,
Wang,
Kai-Le,
Beznosov,
Konstantin
(2011):
Promoting a physical security mental model for personal firewall warnings.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 1585-1590.
https://dx.doi.org/10.1145/1979742.1979812
Jaferian,
Pooya,
Hawkey,
Kirstie,
Sotirakopoulos,
Andreas,
Beznosov,
Konstantin
(2011):
Heuristics for evaluating IT security management tools.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 1633-1638.
https://dx.doi.org/10.1145/1979742.1979820
Jaferian,
Pooya,
Botta,
David,
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2008):
Guidelines for designing IT security management tools.
In:
Proceedings of the 2008 Symposium on Computer Human Interaction for the Management of Information Technology
,
2008,
.
pp. 7.
https://dx.doi.org/10.1145/1477973.1477983
Jaferian,
Pooya,
Botta,
David,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2009):
A case study of enterprise identity management system adoption in an insurance organizatio.
In:
Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology
,
2009,
.
pp. 7.
https://dx.doi.org/10.1145/1641587.1641594
MacKenzie,
Russell,
Hawkey,
Kirstie,
Booth,
Kellogg S.,
Liu,
Zhangbo,
Perswain,
Presley,
Dhillon,
Sukhveer S.
(2012):
LACOME: a multi-user collaboration system for shared large displays.
In:
Companion Proceedings of ACM CSCW12 Conference on Computer-Supported Cooperative Work
,
2012,
.
pp. 267-268.
https://dx.doi.org/10.1145/2141512.2141596
Raja,
Fahimeh,
Hawkey,
Kirstie,
Hsu,
Steven,
Wang,
Kai-Le Clement,
Beznosov,
Konstantin
(2011):
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warni.
In:
Proceedings of the 2011 Symposium on Usable Privacy and Security
,
2011,
.
pp. 1.
https://dx.doi.org/10.1145/2078827.2078829
Sotirakopoulos,
Andreas,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2011):
On the challenges in usable security lab studies: lessons learned from replicating a study.
In:
Proceedings of the 2011 Symposium on Usable Privacy and Security
,
2011,
.
pp. 3.
https://dx.doi.org/10.1145/2078827.2078831
Sun,
San-Tsai,
Pospisil,
Eric,
Muslukhov,
Ildar,
Dindar,
Nuray,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2011):
What makes users refuse web single sign-on?: an empirical investigation of OpenID.
In:
Proceedings of the 2011 Symposium on Usable Privacy and Security
,
2011,
.
pp. 4.
https://dx.doi.org/10.1145/2078827.2078833
Jaferian,
Pooya,
Hawkey,
Kirstie,
Sotirakopoulos,
Andreas,
Velez-Rojas,
Maria,
Beznosov,
Konstantin
(2011):
Heuristics for evaluating IT security management tools.
In:
Proceedings of the 2011 Symposium on Usable Privacy and Security
,
2011,
.
pp. 7.
https://dx.doi.org/10.1145/2078827.2078837