Seuraa
Kirstie Hawkey
Kirstie Hawkey
Senior Instructor, Dalhousie University
Vahvistettu sähköpostiosoite verkkotunnuksessa cs.dal.ca
Nimike
Viittaukset
Viittaukset
Vuosi
An integrated view of human, organizational, and technological challenges of IT security management
R Werlinger, K Hawkey, K Beznosov
Information Management & Computer Security 17 (1), 4-19, 2009
2522009
Preparation, detection, and analysis: the diagnostic work of IT security incident response
R Werlinger, K Muldner, K Hawkey, K Beznosov
Information Management & Computer Security 18 (1), 26-42, 2010
1652010
What makes users refuse web single sign-on? An empirical investigation of OpenID
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
Proceedings of the seventh symposium on usable privacy and security, 1-20, 2011
1382011
On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings
A Sotirakopoulos, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-18, 2011
1242011
Do Windows users follow the principle of least privilege? Investigating user account control practices
S Motiee, K Hawkey, K Beznosov
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010
1232010
Heuristics for evaluating IT security management tools
P Jaferian, K Hawkey, A Sotirakopoulos, M Velez-Rojas, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
982011
The proximity factor: impact of distance on co-located collaboration
K Hawkey, M Kellar, D Reilly, T Whalen, KM Inkpen
Proceedings of the 2005 ACM International Conference on Supporting Group …, 2005
972005
Exploring display factors that influence co-located collaboration: angle, size, number, and user arrangement
K Inkpen, K Hawkey, M Kellar, R Mandryk, K Parker, D Reilly, S Scott, ...
Proc. HCI international 2005, 2005
882005
A billion keys, but few locks: the crisis of web single sign-on
ST Sun, Y Boshmaf, K Hawkey, K Beznosov
Proceedings of the 2010 new security paradigms workshop, 61-72, 2010
852010
Requirements gathering with alzheimer's patients and caregivers
K Hawkey, KM Inkpen, K Rockwood, M McAllister, J Slonim
Proceedings of the 7th international ACM SIGACCESS conference on Computers …, 2005
822005
Security practitioners in context: Their activities and interactions with other stakeholders within organizations
R Werlinger, K Hawkey, D Botta, K Beznosov
International Journal of Human-Computer Studies 67 (7), 584-606, 2009
812009
The challenges of using an intrusion detection system: is it worth the effort?
R Werlinger, K Hawkey, K Muldner, P Jaferian, K Beznosov
Proceedings of the 4th symposium on Usable privacy and security, 107-118, 2008
722008
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures
ST Sun, K Hawkey, K Beznosov
Computers & Security 31 (4), 465-483, 2012
702012
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings
F Raja, K Hawkey, S Hsu, KLC Wang, K Beznosov
Proceedings of the seventh symposium on usable privacy and security, 1-20, 2011
702011
Privacy in the open: how attention mediates awareness and privacy in open-plan offices
JP Birnholtz, C Gutwin, K Hawkey
Proceedings of the 2007 ACM International Conference on Supporting Group …, 2007
632007
Guidelines for designing it security management tools
P Jaferian, D Botta, F Raja, K Hawkey, K Beznosov
Proceedings of the 2nd ACM Symposium on Computer Human interaction For …, 2008
492008
Revealing hidden context: improving mental models of personal firewall users
F Raja, K Hawkey, K Beznosov
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
432009
I did it because I trusted you”: Challenges with the study environment biasing participant behaviours
A Sotirakopoulos, K Hawkey, K Beznosov
SOUPS Usable Security Experiment Reports (USER) Workshop, 2010
422010
Toward understanding distributed cognition in IT security management: the role of cues and norms
D Botta, K Muldner, K Hawkey, K Beznosov
Cognition, Technology & Work 13, 121-134, 2011
412011
Human, organizational, and technological factors of IT security
K Hawkey, D Botta, R Werlinger, K Muldner, A Gagne, K Beznosov
CHI'08 extended abstracts on Human factors in computing systems, 3639-3644, 2008
412008
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20