Konstantin Beznosov

Personal Homepage
http://konstantin.beznosov.net/professional/
Employer
()
Email
beznosov@ece.ubc.ca

Publication Statistics

Publication period start
2007
Publication period end
2011
Number of co-authors
21

Co-authors
Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications

Publications

Raja, Fahimeh, Hawkey, Kirstie, Hsu, Steven, Wang, Kai-Le, Beznosov, Konstantin (2011): Promoting a physical security mental model for personal firewall warnings. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 1585-1590. http://dx.doi.org/10.1145/1979742.1979812

Sun, San-Tsai, Pospisil, Eric, Muslukhov, Ildar, Dindar, Nuray, Hawkey, Kirstie, Beznosov, Konstantin (2011): OpenID-enabled browser: towards usable and secure web single sign-on. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 1291-1296. http://dx.doi.org/10.1145/1979742.1979763

Jaferian, Pooya, Hawkey, Kirstie, Sotirakopoulos, Andreas, Beznosov, Konstantin (2011): Heuristics for evaluating IT security management tools. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 1633-1638. http://dx.doi.org/10.1145/1979742.1979820

Raja, Fahimeh, Hawkey, Kirstie, Hsu, Steven, Wang, Kai-Le Clement, Beznosov, Konstantin (2011): A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warni. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 1. http://dx.doi.org/10.1145/2078827.2078829

Jaferian, Pooya, Hawkey, Kirstie, Sotirakopoulos, Andreas, Velez-Rojas, Maria, Beznosov, Konstantin (2011): Heuristics for evaluating IT security management tools. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 7. http://dx.doi.org/10.1145/2078827.2078837

Sun, San-Tsai, Pospisil, Eric, Muslukhov, Ildar, Dindar, Nuray, Hawkey, Kirstie, Beznosov, Konstantin (2011): What makes users refuse web single sign-on?: an empirical investigation of OpenID. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 4. http://dx.doi.org/10.1145/2078827.2078833

Sotirakopoulos, Andreas, Hawkey, Kirstie, Beznosov, Konstantin (2011): On the challenges in usable security lab studies: lessons learned from replicating a study. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 3. http://dx.doi.org/10.1145/2078827.2078831

Motiee, Sara, Hawkey, Kirstie, Beznosov, Konstantin (2010): Investigating user account control practices. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 4129-4134. http://doi.acm.org/10.1145/1753846.1754114

Motiee, Sara, Hawkey, Kirstie, Beznosov, Konstantin (2010): Do windows users follow the principle of least privilege?: investigating user account cont. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 1. http://doi.acm.org/10.1145/1837110.1837112

Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin, Booth, Kellogg S. (2010): Investigating an appropriate design for personal firewalls. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 4123-4128. http://doi.acm.org/10.1145/1753846.1754113

Jaferian, Pooya, Botta, David, Hawkey, Kirstie, Beznosov, Konstantin (2009): A multi-method approach for user-centered design of identity management systems. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 36. http://doi.acm.org/10.1145/1572532.1572575

Jaferian, Pooya, Botta, David, Hawkey, Kirstie, Beznosov, Konstantin (2009): A case study of enterprise identity management system adoption in an insurance organizatio. In: Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology , 2009, . pp. 7. http://dx.doi.org/10.1145/1641587.1641594

Werlinger, Rodrigo, Hawkey, Kirstie, Botta, David, Beznosov, Konstantin (2009): Security practitioners in context: Their activities and interactions with other stakeholde. In International Journal of Human-Computer Studies, 67 (7) pp. 584-606. http://dx.doi.org/10.1016/j.ijhcs.2009.03.002

Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2009): Towards improving mental models of personal firewall users. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 4633-4638. http://doi.acm.org/10.1145/1520340.1520712

Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2009): Revealing hidden context: improving mental models of personal firewall users. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 1. http://doi.acm.org/10.1145/1572532.1572534

Werlinger, Rodrigo, Hawkey, Kirstie, Muldner, Kasia, Jaferian, Pooya, Beznosov, Konstantin (2008): The challenges of using an intrusion detection system: is it worth the effort?. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 107-118. http://doi.acm.org/10.1145/1408664.1408679

Werlinger, Rodrigo, Hawkey, Kirstie, Beznosov, Konstantin (2008): Security practitioners in context: their activities and interactions. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 3789-3794. http://doi.acm.org/10.1145/1358628.1358931

Jaferian, Pooya, Botta, David, Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2008): Guidelines for designing IT security management tools. In: Frisch, AEleen, Kandogan, Eser, Lutters, Wayne G., Thornton, James D., Mouloua, Mustapha (eds.) CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology November 14-15, 2008, San Diego, California, USA. pp. 7. http://doi.acm.org/10.1145/1477973.1477983

Hawkey, Kirstie, Botta, David, Werlinger, Rodrigo, Muldner, Kasia, Gagné, André, Beznosov, Konstantin (2008): Human, organizational, and technological factors of IT security. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 3639-3644. http://doi.acm.org/10.1145/1358628.1358905

Jaferian, Pooya, Botta, David, Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2008): Guidelines for designing IT security management tools. In: Proceedings of the 2008 Symposium on Computer Human Interaction for the Management of Information Technology , 2008, . pp. 7. http://dx.doi.org/10.1145/1477973.1477983

Hawkey, Kirstie, Muldner, Kasia, Beznosov, Konstantin (2008): Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs. In IEEE Internet Computing, 12 (3) pp. 22-30. http://dx.doi.org/10.1109/MIC.2008.61

Werlinger, Rodrigo, Botta, David, Beznosov, Konstantin (2007): Detecting, analyzing and responding to security incidents: a qualitative analysis. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 149-150. http://cups.cs.cmu.edu/soups/2007/posters/p149_werlinger.pdf

Botta, David, Werlinger, Rodrigo, Gagné, André, Beznosov, Konstantin, Iverson, Lee, Fels, Sidney, Fisher, Brian D. (2007): Towards understanding IT security professionals and their tools. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 100-111. http://konstantin.beznosov.net/professional/works/doi/view.php?116