Spremljaj
Kirstie Hawkey
Kirstie Hawkey
retired
Preverjeni e-poštni naslov na cs.dal.ca
Naslov
Navedeno
Navedeno
Leto
An integrated view of human, organizational, and technological challenges of IT security management
R Werlinger, K Hawkey, K Beznosov
Information Management & Computer Security 17 (1), 4-19, 2009
2602009
Preparation, detection, and analysis: the diagnostic work of IT security incident response
R Werlinger, K Muldner, K Hawkey, K Beznosov
Information Management & Computer Security 18 (1), 26-42, 2010
1712010
What makes users refuse web single sign-on? An empirical investigation of OpenID
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
Proceedings of the seventh symposium on usable privacy and security, 1-20, 2011
1422011
On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings
A Sotirakopoulos, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-18, 2011
1322011
Do Windows users follow the principle of least privilege? Investigating user account control practices
S Motiee, K Hawkey, K Beznosov
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010
1262010
Heuristics for evaluating IT security management tools
P Jaferian, K Hawkey, A Sotirakopoulos, M Velez-Rojas, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
1042011
The proximity factor: impact of distance on co-located collaboration
K Hawkey, M Kellar, D Reilly, T Whalen, KM Inkpen
Proceedings of the 2005 ACM International Conference on Supporting Group …, 2005
1012005
Exploring display factors that influence co-located collaboration: angle, size, number, and user arrangement
K Inkpen, K Hawkey, M Kellar, R Mandryk, K Parker, D Reilly, S Scott, ...
Proc. HCI international 2005, 2005
882005
A billion keys, but few locks: the crisis of web single sign-on
ST Sun, Y Boshmaf, K Hawkey, K Beznosov
Proceedings of the 2010 new security paradigms workshop, 61-72, 2010
872010
Requirements gathering with alzheimer's patients and caregivers
K Hawkey, KM Inkpen, K Rockwood, M McAllister, J Slonim
Proceedings of the 7th international ACM SIGACCESS conference on Computers …, 2005
872005
Security practitioners in context: Their activities and interactions with other stakeholders within organizations
R Werlinger, K Hawkey, D Botta, K Beznosov
International Journal of Human-Computer Studies 67 (7), 584-606, 2009
832009
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings
F Raja, K Hawkey, S Hsu, KLC Wang, K Beznosov
Proceedings of the seventh symposium on usable privacy and security, 1-20, 2011
792011
The challenges of using an intrusion detection system: is it worth the effort?
R Werlinger, K Hawkey, K Muldner, P Jaferian, K Beznosov
Proceedings of the 4th symposium on Usable privacy and security, 107-118, 2008
762008
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures
ST Sun, K Hawkey, K Beznosov
Computers & Security 31 (4), 465-483, 2012
732012
Privacy in the open: how attention mediates awareness and privacy in open-plan offices
JP Birnholtz, C Gutwin, K Hawkey
Proceedings of the 2007 ACM International Conference on Supporting Group …, 2007
642007
Guidelines for designing it security management tools
P Jaferian, D Botta, F Raja, K Hawkey, K Beznosov
Proceedings of the 2nd ACM Symposium on Computer Human interaction For …, 2008
512008
I did it because I trusted you”: Challenges with the study environment biasing participant behaviours
A Sotirakopoulos, K Hawkey, K Beznosov
SOUPS Usable Security Experiment Reports (USER) Workshop, 2010
442010
Revealing hidden context: improving mental models of personal firewall users
F Raja, K Hawkey, K Beznosov
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
442009
Investigating users’ perspectives of web single sign-on: Conceptual gaps and acceptance model
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
ACM Transactions on Internet Technology (TOIT) 13 (1), 1-35, 2013
432013
Human, organizational, and technological factors of IT security
K Hawkey, D Botta, R Werlinger, K Muldner, A Gagne, K Beznosov
CHI'08 extended abstracts on Human factors in computing systems, 3639-3644, 2008
432008
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20