Author: Kirstie Hawkey

Publications

Publication period start: 2005
Publication period end: 2012
Number of co-authors: 44

Co-authors

Number of publications with favourite co-authors
Fahimeh Raja
7
Kori Inkpen
12
Konstantin Beznosov
21

Productive Colleagues

Most productive colleagues in number of publications
Kori Inkpen
70
Mary Czerwinski
80
Carl Gutwin
116

Publications

Werlinger, Rodrigo, Hawkey, Kirstie, Botta, David, Beznosov, Konstantin (2009): Security practitioners in context: Their activities and interactions with other stakeholde. In International Journal of Human-Computer Studies, 67 (7) pp. 584-606. http://dx.doi.org/10.1016/j.ijhcs.2009.03.002

Hawkey, Kirstie, Muldner, Kasia, Beznosov, Konstantin (2008): Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs. In IEEE Internet Computing, 12 (3) pp. 22-30. http://dx.doi.org/10.1109/MIC.2008.61

Kellar, Melanie, Hawkey, Kirstie, Inkpen, Kori, Watters, Carolyn R. (2008): Challenges of Capturing Natural Web-Based User Behaviors. In International Journal of Human-Computer Interaction, 24 (4) pp. 385-409. http://www.informaworld.com/10.1080/10447310801973739

Tan, Desney S., Gergle, Darren, Mandryk, Regan L., Inkpen, Kori, Kellar, Melanie, Hawkey, Kirstie, Czerwinski, Mary (2008): Using job-shop scheduling tasks for evaluating collocated collaboration. In Personal and Ubiquitous Computing, 12 (3) pp. 255-267. http://dx.doi.org/10.1007/s00779-007-0154-3

Dearman, David, Hawkey, Kirstie, Inkpen, Kori (2005): Rendezvousing with location-aware devices: Enhancing social coordination. In Interacting with Computers, 17 (5) pp. 542-566. http://dx.doi.org/10.1016/j.intcom.2005.03.005

Hawkey, Kirstie, Kellar, Melanie, Reilly, Derek, Whalen, Tara, Inkpen, Kori (2005): The proximity factor: impact of distance on co-located collaboration. In: GROUP05: International Conference on Supporting Group Work November 6-9, 2005, Sanibel Island, Florida, USA. pp. 31-40. http://doi.acm.org/10.1145/1099203.1099209

Sun, San-Tsai, Pospisil, Eric, Muslukhov, Ildar, Dindar, Nuray, Hawkey, Kirstie, Beznosov, Konstantin (2011): OpenID-enabled browser: towards usable and secure web single sign-on. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 1291-1296. http://dx.doi.org/10.1145/1979742.1979763

Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin, Booth, Kellogg S. (2010): Investigating an appropriate design for personal firewalls. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 4123-4128. http://doi.acm.org/10.1145/1753846.1754113

Motiee, Sara, Hawkey, Kirstie, Beznosov, Konstantin (2010): Investigating user account control practices. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 4129-4134. http://doi.acm.org/10.1145/1753846.1754114

Maksakov, Evgeny, Booth, Kellogg S., Hawkey, Kirstie (2010): Whale Tank Virtual Reality. In: Proceedings of the 2010 Conference on Graphics Interface , 2010, . pp. 185-192. http://doi.acm.org/10.1145/4713060.1839247

Raja, Fahimeh, Hawkey, Kirstie, Hsu, Steven, Wang, Kai-Le, Beznosov, Konstantin (2011): Promoting a physical security mental model for personal firewall warnings. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 1585-1590. http://dx.doi.org/10.1145/1979742.1979812

Jaferian, Pooya, Botta, David, Hawkey, Kirstie, Beznosov, Konstantin (2009): A multi-method approach for user-centered design of identity management systems. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 36. http://doi.acm.org/10.1145/1572532.1572575

Jaferian, Pooya, Hawkey, Kirstie, Sotirakopoulos, Andreas, Beznosov, Konstantin (2011): Heuristics for evaluating IT security management tools. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 1633-1638. http://dx.doi.org/10.1145/1979742.1979820

Jaferian, Pooya, Botta, David, Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2008): Guidelines for designing IT security management tools. In: Proceedings of the 2008 Symposium on Computer Human Interaction for the Management of Information Technology , 2008, . pp. 7. http://dx.doi.org/10.1145/1477973.1477983

Jaferian, Pooya, Botta, David, Hawkey, Kirstie, Beznosov, Konstantin (2009): A case study of enterprise identity management system adoption in an insurance organizatio. In: Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology , 2009, . pp. 7. http://dx.doi.org/10.1145/1641587.1641594

MacKenzie, Russell, Hawkey, Kirstie, Booth, Kellogg S., Liu, Zhangbo, Perswain, Presley, Dhillon, Sukhveer S. (2012): LACOME: a multi-user collaboration system for shared large displays. In: Companion Proceedings of ACM CSCW12 Conference on Computer-Supported Cooperative Work , 2012, . pp. 267-268. http://dx.doi.org/10.1145/2141512.2141596

Raja, Fahimeh, Hawkey, Kirstie, Hsu, Steven, Wang, Kai-Le Clement, Beznosov, Konstantin (2011): A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warni. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 1. http://dx.doi.org/10.1145/2078827.2078829

Sotirakopoulos, Andreas, Hawkey, Kirstie, Beznosov, Konstantin (2011): On the challenges in usable security lab studies: lessons learned from replicating a study. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 3. http://dx.doi.org/10.1145/2078827.2078831

Sun, San-Tsai, Pospisil, Eric, Muslukhov, Ildar, Dindar, Nuray, Hawkey, Kirstie, Beznosov, Konstantin (2011): What makes users refuse web single sign-on?: an empirical investigation of OpenID. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 4. http://dx.doi.org/10.1145/2078827.2078833

Motiee, Sara, Hawkey, Kirstie, Beznosov, Konstantin (2010): Do windows users follow the principle of least privilege?: investigating user account cont. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 1. http://doi.acm.org/10.1145/1837110.1837112

Hawkey, Kirstie (2008): Exploring a human centered approach to managing visual privacy concerns during collaborati. In: Proceedings of the 2008 ACM International Workshop on Human-Centered Multimedia , 2008, . pp. 69-76. http://doi.acm.org/10.1145/1462027.1462038

Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2009): Revealing hidden context: improving mental models of personal firewall users. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 1. http://doi.acm.org/10.1145/1572532.1572534

Jaferian, Pooya, Botta, David, Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2008): Guidelines for designing IT security management tools. In: Frisch, AEleen, Kandogan, Eser, Lutters, Wayne G., Thornton, James D., Mouloua, Mustapha (eds.) CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology November 14-15, 2008, San Diego, California, USA. pp. 7. http://doi.acm.org/10.1145/1477973.1477983

Hawkey, Kirstie, Inkpen, Kori (2006): Keeping up appearances: understanding the dimensions of incidental information privacy. In: Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems , 2006, . pp. 821-830. http://doi.acm.org/10.1145/1124772.1124893

Hawkey, Kirstie, Inkpen, Kori (2006): Examining the content and privacy of web browsing incidental information. In: Proceedings of the 2006 International Conference on the World Wide Web , 2006, . pp. 123-132. http://doi.acm.org/10.1145/1135777.1135801

Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2009): Towards improving mental models of personal firewall users. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 4633-4638. http://doi.acm.org/10.1145/1520340.1520712

Werlinger, Rodrigo, Hawkey, Kirstie, Muldner, Kasia, Jaferian, Pooya, Beznosov, Konstantin (2008): The challenges of using an intrusion detection system: is it worth the effort?. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 107-118. http://doi.acm.org/10.1145/1408664.1408679

Birnholtz, Jeremy P., Gutwin, Carl, Hawkey, Kirstie (2007): Privacy in the open: how attention mediates awareness and privacy in open-plan offices. In: GROUP07: International Conference on Supporting Group Work , 2007, . pp. 51-60. http://doi.acm.org/10.1145/1316624.1316632

Werlinger, Rodrigo, Hawkey, Kirstie, Beznosov, Konstantin (2008): Security practitioners in context: their activities and interactions. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 3789-3794. http://doi.acm.org/10.1145/1358628.1358931

Hawkey, Kirstie, Botta, David, Werlinger, Rodrigo, Muldner, Kasia, Gagné, André, Beznosov, Konstantin (2008): Human, organizational, and technological factors of IT security. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 3639-3644. http://doi.acm.org/10.1145/1358628.1358905

Hawkey, Kirstie, Inkpen, Kori (2007): PrivateBits: managing visual privacy in web browsers. In: Proceedings of the 2007 Conference on Graphics Interface , 2007, . pp. 215-223. http://doi.acm.org/10.1145/1268517.1268553

Dearman, David, Hawkey, Kirstie, Inkpen, Kori (2005): Effect of location-awareness on rendezvous behaviour. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems , 2005, . pp. 1929-1932. http://doi.acm.org/10.1145/1056808.1057059

Kellar, Melanie, Reilly, Derek, Hawkey, Kirstie, Rodgers, Malcolm, MacKay, Bonnie, Dearman, David, Ha, Vicki, MacInnes, W. Joseph, Nunes, Michael, Parker, Karen, Whalen, Tara, Inkpen, Kori (2005): It\'s a jungle out there: practical considerations for evaluation in the city. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems , 2005, . pp. 1533-1536. http://doi.acm.org/10.1145/1056808.1056959

Hawkey, Kirstie, Inkpen, Kori (2005): Web browsing today: the impact of changing contexts on user activity. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems , 2005, . pp. 1443-1446. http://doi.acm.org/10.1145/1056808.1056937

Hawkey, Kirstie, Inkpen, Kori (2005): Privacy gradients: exploring ways to manage incidental information during co-located colla. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems , 2005, . pp. 1431-1434. http://doi.acm.org/10.1145/1056808.1056934

Hawkey, Kirstie, Inkpen, Kori, Rockwood, Kenneth, McAllister, Michael, Slonim, Jacob (2005): Requirements gathering with alzheimer\'s patients and caregivers. In: Seventh Annual ACM Conference on Assistive Technologies , 2005, . pp. 142-149. http://doi.acm.org/10.1145/1090785.1090812

Jaferian, Pooya, Hawkey, Kirstie, Sotirakopoulos, Andreas, Velez-Rojas, Maria, Beznosov, Konstantin (2011): Heuristics for evaluating IT security management tools. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 7. http://dx.doi.org/10.1145/2078827.2078837