Seguir
Kirstie Hawkey
Kirstie Hawkey
retired
Dirección de correo verificada de cs.dal.ca
Título
Citado por
Citado por
Año
An integrated view of human, organizational, and technological challenges of IT security management
R Werlinger, K Hawkey, K Beznosov
Information Management & Computer Security 17 (1), 4-19, 2009
2702009
Preparation, detection, and analysis: the diagnostic work of IT security incident response
R Werlinger, K Muldner, K Hawkey, K Beznosov
Information Management & Computer Security 18 (1), 26-42, 2010
1752010
What makes users refuse web single sign-on? An empirical investigation of OpenID
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
Proceedings of the seventh symposium on usable privacy and security, 1-20, 2011
1412011
On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings
A Sotirakopoulos, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on usable Privacy and Security, 1-18, 2011
1332011
Do Windows users follow the principle of least privilege? Investigating user account control practices
S Motiee, K Hawkey, K Beznosov
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010
1272010
Heuristics for evaluating IT security management tools
P Jaferian, K Hawkey, A Sotirakopoulos, M Velez-Rojas, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
1052011
The proximity factor: impact of distance on co-located collaboration
K Hawkey, M Kellar, D Reilly, T Whalen, KM Inkpen
Proceedings of the 2005 ACM International Conference on Supporting Group …, 2005
1012005
Exploring display factors that influence co-located collaboration: angle, size, number, and user arrangement
K Inkpen, K Hawkey, M Kellar, R Mandryk, K Parker, D Reilly, S Scott, ...
Proc. HCI international 2005, 2005
912005
A billion keys, but few locks: the crisis of web single sign-on
ST Sun, Y Boshmaf, K Hawkey, K Beznosov
Proceedings of the 2010 new security paradigms workshop, 61-72, 2010
872010
Requirements gathering with alzheimer's patients and caregivers
K Hawkey, KM Inkpen, K Rockwood, M McAllister, J Slonim
Proceedings of the 7th international ACM SIGACCESS conference on Computers …, 2005
872005
Security practitioners in context: Their activities and interactions with other stakeholders within organizations
R Werlinger, K Hawkey, D Botta, K Beznosov
International Journal of Human-Computer Studies 67 (7), 584-606, 2009
862009
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings
F Raja, K Hawkey, S Hsu, KLC Wang, K Beznosov
Proceedings of the seventh symposium on usable privacy and security, 1-20, 2011
822011
The challenges of using an intrusion detection system: is it worth the effort?
R Werlinger, K Hawkey, K Muldner, P Jaferian, K Beznosov
Proceedings of the 4th symposium on Usable privacy and security, 107-118, 2008
752008
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures
ST Sun, K Hawkey, K Beznosov
Computers & Security 31 (4), 465-483, 2012
742012
Privacy in the open: how attention mediates awareness and privacy in open-plan offices
JP Birnholtz, C Gutwin, K Hawkey
Proceedings of the 2007 ACM International Conference on Supporting Group …, 2007
622007
Guidelines for designing it security management tools
P Jaferian, D Botta, F Raja, K Hawkey, K Beznosov
Proceedings of the 2nd ACM Symposium on Computer Human interaction For …, 2008
482008
Investigating users’ perspectives of web single sign-on: Conceptual gaps and acceptance model
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
ACM Transactions on Internet Technology (TOIT) 13 (1), 1-35, 2013
442013
I did it because I trusted you”: Challenges with the study environment biasing participant behaviours
A Sotirakopoulos, K Hawkey, K Beznosov
SOUPS Usable Security Experiment Reports (USER) Workshop, 2010
442010
Revealing hidden context: improving mental models of personal firewall users
F Raja, K Hawkey, K Beznosov
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
442009
Toward understanding distributed cognition in IT security management: the role of cues and norms
D Botta, K Muldner, K Hawkey, K Beznosov
Cognition, Technology & Work 13, 121-134, 2011
432011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20