Author: Konstantin Beznosov
Publication Overview
Publication period start: 2011
Number of co-authors: 21
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Werlinger,
Rodrigo,
Hawkey,
Kirstie,
Botta,
David,
Beznosov,
Konstantin
(2009):
Security practitioners in context: Their activities and interactions with other stakeholde.
In
International Journal of Human-Computer Studies,
67
(7)
pp. 584-606.
https://dx.doi.org/10.1016/j.ijhcs.2009.03.002
Hawkey,
Kirstie,
Muldner,
Kasia,
Beznosov,
Konstantin
(2008):
Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs.
In
IEEE Internet Computing,
12
(3)
pp. 22-30.
https://dx.doi.org/10.1109/MIC.2008.61
Hawkey,
Kirstie,
Botta,
David,
Werlinger,
Rodrigo,
Muldner,
Kasia,
Gagné,
André,
Beznosov,
Konstantin
(2008):
Human, organizational, and technological factors of IT security.
In:
Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems
April 5-10,
2008,
.
pp. 3639-3644.
https://doi.acm.org/10.1145/1358628.1358905
Werlinger,
Rodrigo,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2008):
Security practitioners in context: their activities and interactions.
In:
Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems
April 5-10,
2008,
.
pp. 3789-3794.
https://doi.acm.org/10.1145/1358628.1358931
Botta,
David,
Werlinger,
Rodrigo,
Gagné,
André,
Beznosov,
Konstantin,
Iverson,
Lee,
Fels,
Sidney,
Fisher,
Brian D.
(2007):
Towards understanding IT security professionals and their tools.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 100-111.
https://konstantin.beznosov.net/professional/works/doi/view.php?116
Werlinger,
Rodrigo,
Botta,
David,
Beznosov,
Konstantin
(2007):
Detecting, analyzing and responding to security incidents: a qualitative analysis.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 149-150.
https://cups.cs.cmu.edu/soups/2007/posters/p149_werlinger.pdf
Werlinger,
Rodrigo,
Hawkey,
Kirstie,
Muldner,
Kasia,
Jaferian,
Pooya,
Beznosov,
Konstantin
(2008):
The challenges of using an intrusion detection system: is it worth the effort?.
In:
Proceedings of the 2008 Symposium on Usable Privacy and Security
,
2008,
.
pp. 107-118.
https://doi.acm.org/10.1145/1408664.1408679
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2009):
Towards improving mental models of personal firewall users.
In:
Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems
,
2009,
.
pp. 4633-4638.
https://doi.acm.org/10.1145/1520340.1520712
Jaferian,
Pooya,
Botta,
David,
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2008):
Guidelines for designing IT security management tools.
In:
Frisch,
AEleen,
Kandogan,
Eser,
Lutters,
Wayne G.,
Thornton,
James D.,
Mouloua,
Mustapha
(eds.)
CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
November 14-15,
2008,
San Diego, California, USA.
pp. 7.
https://doi.acm.org/10.1145/1477973.1477983
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2009):
Revealing hidden context: improving mental models of personal firewall users.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 1.
https://doi.acm.org/10.1145/1572532.1572534
Jaferian,
Pooya,
Botta,
David,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2009):
A multi-method approach for user-centered design of identity management systems.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 36.
https://doi.acm.org/10.1145/1572532.1572575
Motiee,
Sara,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2010):
Do windows users follow the principle of least privilege?: investigating user account cont.
In:
Proceedings of the 2010 Symposium on Usable Privacy and Security
,
2010,
.
pp. 1.
https://doi.acm.org/10.1145/1837110.1837112
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin,
Booth,
Kellogg S.
(2010):
Investigating an appropriate design for personal firewalls.
In:
Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems
,
2010,
.
pp. 4123-4128.
https://doi.acm.org/10.1145/1753846.1754113
Motiee,
Sara,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2010):
Investigating user account control practices.
In:
Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems
,
2010,
.
pp. 4129-4134.
https://doi.acm.org/10.1145/1753846.1754114
Sun,
San-Tsai,
Pospisil,
Eric,
Muslukhov,
Ildar,
Dindar,
Nuray,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2011):
OpenID-enabled browser: towards usable and secure web single sign-on.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 1291-1296.
https://dx.doi.org/10.1145/1979742.1979763
Raja,
Fahimeh,
Hawkey,
Kirstie,
Hsu,
Steven,
Wang,
Kai-Le,
Beznosov,
Konstantin
(2011):
Promoting a physical security mental model for personal firewall warnings.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 1585-1590.
https://dx.doi.org/10.1145/1979742.1979812
Jaferian,
Pooya,
Hawkey,
Kirstie,
Sotirakopoulos,
Andreas,
Beznosov,
Konstantin
(2011):
Heuristics for evaluating IT security management tools.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 1633-1638.
https://dx.doi.org/10.1145/1979742.1979820
Jaferian,
Pooya,
Botta,
David,
Raja,
Fahimeh,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2008):
Guidelines for designing IT security management tools.
In:
Proceedings of the 2008 Symposium on Computer Human Interaction for the Management of Information Technology
,
2008,
.
pp. 7.
https://dx.doi.org/10.1145/1477973.1477983
Jaferian,
Pooya,
Botta,
David,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2009):
A case study of enterprise identity management system adoption in an insurance organizatio.
In:
Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology
,
2009,
.
pp. 7.
https://dx.doi.org/10.1145/1641587.1641594
Raja,
Fahimeh,
Hawkey,
Kirstie,
Hsu,
Steven,
Wang,
Kai-Le Clement,
Beznosov,
Konstantin
(2011):
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warni.
In:
Proceedings of the 2011 Symposium on Usable Privacy and Security
,
2011,
.
pp. 1.
https://dx.doi.org/10.1145/2078827.2078829
Sotirakopoulos,
Andreas,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2011):
On the challenges in usable security lab studies: lessons learned from replicating a study.
In:
Proceedings of the 2011 Symposium on Usable Privacy and Security
,
2011,
.
pp. 3.
https://dx.doi.org/10.1145/2078827.2078831
Sun,
San-Tsai,
Pospisil,
Eric,
Muslukhov,
Ildar,
Dindar,
Nuray,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2011):
What makes users refuse web single sign-on?: an empirical investigation of OpenID.
In:
Proceedings of the 2011 Symposium on Usable Privacy and Security
,
2011,
.
pp. 4.
https://dx.doi.org/10.1145/2078827.2078833
Jaferian,
Pooya,
Hawkey,
Kirstie,
Sotirakopoulos,
Andreas,
Velez-Rojas,
Maria,
Beznosov,
Konstantin
(2011):
Heuristics for evaluating IT security management tools.
In:
Proceedings of the 2011 Symposium on Usable Privacy and Security
,
2011,
.
pp. 7.
https://dx.doi.org/10.1145/2078827.2078837