Publications

Publication period start: 2011
Number of co-authors: 21

Co-authors

Number of publications with favourite co-authors
Fahimeh Raja
7
David Botta
8
Kirstie Hawkey
21

Productive Colleagues

Most productive colleagues in number of publications
Sidney Fels
36
Kirstie Hawkey
37
Kellogg S. Booth
56

Publications

Werlinger, Rodrigo, Hawkey, Kirstie, Botta, David, Beznosov, Konstantin (2009): Security practitioners in context: Their activities and interactions with other stakeholde. In International Journal of Human-Computer Studies, 67 (7) pp. 584-606. https://dx.doi.org/10.1016/j.ijhcs.2009.03.002

Hawkey, Kirstie, Muldner, Kasia, Beznosov, Konstantin (2008): Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs. In IEEE Internet Computing, 12 (3) pp. 22-30. https://dx.doi.org/10.1109/MIC.2008.61

Hawkey, Kirstie, Botta, David, Werlinger, Rodrigo, Muldner, Kasia, Gagné, André, Beznosov, Konstantin (2008): Human, organizational, and technological factors of IT security. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 3639-3644. https://doi.acm.org/10.1145/1358628.1358905

Werlinger, Rodrigo, Hawkey, Kirstie, Beznosov, Konstantin (2008): Security practitioners in context: their activities and interactions. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 3789-3794. https://doi.acm.org/10.1145/1358628.1358931

Botta, David, Werlinger, Rodrigo, Gagné, André, Beznosov, Konstantin, Iverson, Lee, Fels, Sidney, Fisher, Brian D. (2007): Towards understanding IT security professionals and their tools. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 100-111. https://konstantin.beznosov.net/professional/works/doi/view.php?116

Werlinger, Rodrigo, Botta, David, Beznosov, Konstantin (2007): Detecting, analyzing and responding to security incidents: a qualitative analysis. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 149-150. https://cups.cs.cmu.edu/soups/2007/posters/p149_werlinger.pdf

Werlinger, Rodrigo, Hawkey, Kirstie, Muldner, Kasia, Jaferian, Pooya, Beznosov, Konstantin (2008): The challenges of using an intrusion detection system: is it worth the effort?. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 107-118. https://doi.acm.org/10.1145/1408664.1408679

Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2009): Towards improving mental models of personal firewall users. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 4633-4638. https://doi.acm.org/10.1145/1520340.1520712

Jaferian, Pooya, Botta, David, Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2008): Guidelines for designing IT security management tools. In: Frisch, AEleen, Kandogan, Eser, Lutters, Wayne G., Thornton, James D., Mouloua, Mustapha (eds.) CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology November 14-15, 2008, San Diego, California, USA. pp. 7. https://doi.acm.org/10.1145/1477973.1477983

Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2009): Revealing hidden context: improving mental models of personal firewall users. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 1. https://doi.acm.org/10.1145/1572532.1572534

Jaferian, Pooya, Botta, David, Hawkey, Kirstie, Beznosov, Konstantin (2009): A multi-method approach for user-centered design of identity management systems. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 36. https://doi.acm.org/10.1145/1572532.1572575

Motiee, Sara, Hawkey, Kirstie, Beznosov, Konstantin (2010): Do windows users follow the principle of least privilege?: investigating user account cont. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 1. https://doi.acm.org/10.1145/1837110.1837112

Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin, Booth, Kellogg S. (2010): Investigating an appropriate design for personal firewalls. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 4123-4128. https://doi.acm.org/10.1145/1753846.1754113

Motiee, Sara, Hawkey, Kirstie, Beznosov, Konstantin (2010): Investigating user account control practices. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 4129-4134. https://doi.acm.org/10.1145/1753846.1754114

Sun, San-Tsai, Pospisil, Eric, Muslukhov, Ildar, Dindar, Nuray, Hawkey, Kirstie, Beznosov, Konstantin (2011): OpenID-enabled browser: towards usable and secure web single sign-on. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 1291-1296. https://dx.doi.org/10.1145/1979742.1979763

Raja, Fahimeh, Hawkey, Kirstie, Hsu, Steven, Wang, Kai-Le, Beznosov, Konstantin (2011): Promoting a physical security mental model for personal firewall warnings. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 1585-1590. https://dx.doi.org/10.1145/1979742.1979812

Jaferian, Pooya, Hawkey, Kirstie, Sotirakopoulos, Andreas, Beznosov, Konstantin (2011): Heuristics for evaluating IT security management tools. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 1633-1638. https://dx.doi.org/10.1145/1979742.1979820

Jaferian, Pooya, Botta, David, Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2008): Guidelines for designing IT security management tools. In: Proceedings of the 2008 Symposium on Computer Human Interaction for the Management of Information Technology , 2008, . pp. 7. https://dx.doi.org/10.1145/1477973.1477983

Jaferian, Pooya, Botta, David, Hawkey, Kirstie, Beznosov, Konstantin (2009): A case study of enterprise identity management system adoption in an insurance organizatio. In: Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology , 2009, . pp. 7. https://dx.doi.org/10.1145/1641587.1641594

Raja, Fahimeh, Hawkey, Kirstie, Hsu, Steven, Wang, Kai-Le Clement, Beznosov, Konstantin (2011): A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warni. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 1. https://dx.doi.org/10.1145/2078827.2078829

Sotirakopoulos, Andreas, Hawkey, Kirstie, Beznosov, Konstantin (2011): On the challenges in usable security lab studies: lessons learned from replicating a study. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 3. https://dx.doi.org/10.1145/2078827.2078831

Sun, San-Tsai, Pospisil, Eric, Muslukhov, Ildar, Dindar, Nuray, Hawkey, Kirstie, Beznosov, Konstantin (2011): What makes users refuse web single sign-on?: an empirical investigation of OpenID. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 4. https://dx.doi.org/10.1145/2078827.2078833

Jaferian, Pooya, Hawkey, Kirstie, Sotirakopoulos, Andreas, Velez-Rojas, Maria, Beznosov, Konstantin (2011): Heuristics for evaluating IT security management tools. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 7. https://dx.doi.org/10.1145/2078827.2078837