Kirstie Hawkey
Kirstie Hawkey
確認したメール アドレス: cs.dal.ca
タイトル
引用先
引用先
An integrated view of human, organizational, and technological challenges of IT security management
SM Furnell, N Clarke, R Werlinger, K Hawkey, K Beznosov
Information Management & Computer Security, 2009
1902009
Preparation, detection, and analysis: the diagnostic work of IT security incident response
SM Furnell, N Clarke, R Werlinger, K Muldner, K Hawkey, K Beznosov
Information Management & Computer Security, 2010
1222010
What makes users refuse web single sign-on? An empirical investigation of OpenID
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
1042011
Do Windows users follow the principle of least privilege? Investigating user account control practices
S Motiee, K Hawkey, K Beznosov
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010
1012010
On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings
A Sotirakopoulos, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-18, 2011
912011
Walk'n scroll: a comparison of software-based navigation techniques for different levels of mobility
B MacKay, D Dearman, K Inkpen, C Watters
Proceedings of the 7th international conference on Human computer …, 2005
912005
The proximity factor: impact of distance on co-located collaboration
K Hawkey, M Kellar, D Reilly, T Whalen, KM Inkpen
Proceedings of the 2005 international ACM SIGGROUP conference on Supporting …, 2005
822005
Exploring display factors that influence co-located collaboration: angle, size, number, and user arrangement
K Inkpen, K Hawkey, M Kellar, R Mandryk, K Parker, D Reilly, S Scott, ...
Proc. HCI international 2005, 2005
782005
Requirements gathering with alzheimer's patients and caregivers
K Hawkey, KM Inkpen, K Rockwood, M McAllister, J Slonim
Proceedings of the 7th international ACM SIGACCESS conference on Computers …, 2005
772005
A billion keys, but few locks: the crisis of web single sign-on
ST Sun, Y Boshmaf, K Hawkey, K Beznosov
Proceedings of the 2010 New Security Paradigms Workshop, 61-72, 2010
762010
Security practitioners in context: Their activities and interactions with other stakeholders within organizations
R Werlinger, K Hawkey, D Botta, K Beznosov
International Journal of Human-Computer Studies 67 (7), 584-606, 2009
642009
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures
ST Sun, K Hawkey, K Beznosov
Computers & Security 31 (4), 465-483, 2012
632012
Heuristics for evaluating IT security management tools
P Jaferian, K Hawkey, A Sotirakopoulos, M Velez-Rojas, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
632011
The challenges of using an intrusion detection system: is it worth the effort?
R Werlinger, K Hawkey, K Muldner, P Jaferian, K Beznosov
Proceedings of the 4th symposium on Usable privacy and security, 107-118, 2008
602008
Privacy in the open: how attention mediates awareness and privacy in open-plan offices
JP Birnholtz, C Gutwin, K Hawkey
Proceedings of the 2007 international ACM conference on Supporting group …, 2007
602007
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings
F Raja, K Hawkey, S Hsu, KLC Wang, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
422011
I did it because I trusted you”: Challenges with the study environment biasing participant behaviours
A Sotirakopoulos, K Hawkey, K Beznosov
SOUPS Usable Security Experiment Reports (USER) Workshop, 2010
402010
Guidelines for designing IT security management tools
P Jaferian, D Botta, F Raja, K Hawkey, K Beznosov
Proceedings of the 2nd ACM Symposium on Computer Human interaction For …, 2008
382008
Toward understanding distributed cognition in IT security management: the role of cues and norms
D Botta, K Muldner, K Hawkey, K Beznosov
Cognition, Technology & Work 13 (2), 121-134, 2011
372011
It's a jungle out there: practical considerations for evaluation in the city
M Kellar, D Reilly, K Hawkey, M Rodgers, B MacKay, D Dearman, V Ha, ...
CHI'05 extended abstracts on Human factors in computing systems, 1533-1536, 2005
372005
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20