Kirstie Hawkey

According to our database1, Kirstie Hawkey authored at least 68 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
MAR: A Study of the Impact of Positive and Negative Reinforcement on Medication Adherence Reminders.
Proceedings of the 8th IEEE International Conference on Serious Games and Applications for Health, 2020

2019
Personal Safety App Effectiveness.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Toward Applying Online Privacy Patterns Based on the Design Problem: A Systematic Review.
Proceedings of the Design, User Experience, and Usability: Theory and Practice, 2018

2017
Participatory design research to understand the legal and technological perspectives in designing health information technology.
Proceedings of the 35th ACM International Conference on the Design of Communication, 2017

2016
Scale-based Exploded Views: A Selection Method for Mobile Devices.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

Who Are You? It Depends (On What You Ask Me!): Context-Dependent Dynamic User Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia's Personal Health Information Act.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Enhancing Mobile Content Privacy with Proxemics Aware Notifications and Protection.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Exploring Privacy Notification and Control Mechanisms for Proximity-Aware Tablets.
Int. J. Mob. Hum. Comput. Interact., 2015

Somebody Is Peeking!: A Proximity and Privacy Aware Tablet Interface.
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 2015

2014
Heuristics for Evaluating IT Security Management Tools.
Hum. Comput. Interact., 2014

Understanding the Tradeoffs of Mobile Device Output Modalities in Just-in-time Learning of Mechanical Tasks.
Proceedings of the 2014 Mulitmedia, 2014

Exploring the need for visualizations in system administration tools.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Enhancing LACOME to Consider Privacy and Security Concerns.
Proceedings of the Distributed User Interfaces: Usability and Collaboration, 2013

Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model.
ACM Trans. Internet Techn., 2013

2012
Report from the 5th ACM Symposium on Computer Human Interaction for Management of IT.
login Usenix Mag., 2012

Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures.
Comput. Secur., 2012

GROUP workshop proposal: collaboration in managing computer systems.
Proceedings of the ACM 2012 International Conference on Support Group Work, 2012

LACOME: a multi-user collaboration system for shared large displays.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, Seattle, WA, USA, February 11-15, 2012, 2012

2011
Toward understanding distributed cognition in IT security management: the role of cues and norms.
Cogn. Technol. Work., 2011

What makes users refuse web single sign-on?: an empirical investigation of OpenID.
Proceedings of the Symposium On Usable Privacy and Security, 2011

On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings.
Proceedings of the Symposium On Usable Privacy and Security, 2011

A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings.
Proceedings of the Symposium On Usable Privacy and Security, 2011

OpenID-enabled browser: towards usable and secure web single sign-on.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Promoting a physical security mental model for personal firewall warnings.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Heuristics for evaluating IT security management tools.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Preparation, detection, and analysis: the diagnostic work of IT security incident response.
Inf. Manag. Comput. Secur., 2010

The benefits of more electronic screen space on students' retention of material in classroom lectures.
Comput. Educ., 2010

Do windows users follow the principle of least privilege?: investigating user account control practices.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

A billion keys, but few locks: the crisis of web single sign-on.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Whale Tank Virtual Reality.
Proceedings of the Graphics Interface 2010 Conference, May 31, 2010

OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

Investigating an appropriate design for personal firewalls.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Investigating user account control practices.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
An integrated view of human, organizational, and technological challenges of IT security management.
Inf. Manag. Comput. Secur., 2009

Security practitioners in context: Their activities and interactions with other stakeholders within organizations.
Int. J. Hum. Comput. Stud., 2009

Revealing hidden context: improving mental models of personal firewall users.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

A multi-method approach for user-centered design of identity management systems.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009

Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A case study of enterprise identity management system adoption in an insurance organization.
Proceedings of the 3rd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2009

Towards improving mental models of personal firewall users.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Secure Web 2.0 Content Sharing Beyond Walled Gardens.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Using job-shop scheduling tasks for evaluating collocated collaboration.
Pers. Ubiquitous Comput., 2008

Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs.
IEEE Internet Comput., 2008

Challenges of Capturing Natural Web-Based User Behaviors.
Int. J. Hum. Comput. Interact., 2008

The challenges of using an intrusion detection system: is it worth the effort?
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Exploring a human centered approach to managing visual privacy concerns during collaboration.
Proceedings of the 3rd ACM Workshop on Human-Centered Computing, 2008

Human, Organizational and Technological Challenges of Implementing IT Security in Organizations.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

Guidelines for designing IT security management tools.
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2008

Security practitioners in context: their activities and interactions.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

Human, organizational, and technological factors of IT security.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Editorial.
J. Web Eng., 2007

Privacy in the open: how attention mediates awareness and privacy in open-plan offices.
Proceedings of the 2007 International ACM SIGGROUP Conference on Supporting Group Work, 2007

PrivateBits: managing visual privacy in web browsers.
Proceedings of the Graphics Interface 2007 Conference, May 28-30, 2007, Montreal, Canada, 2007

2006
Examining the content and privacy of web browsing incidental information.
Proceedings of the 15th international conference on World Wide Web, 2006

Keeping up appearances: understanding the dimensions of incidental information privacy.
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2005
Rendezvousing with location-aware devices: Enhancing social coordination.
Interact. Comput., 2005

The proximity factor: impact of distance on co-located collaboration.
Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, 2005

It's a jungle out there: practical considerations for evaluation in the city.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

Web browsing today: the impact of changing contexts on user activity.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

Privacy gradients: exploring ways to manage incidental information during co-located collaboration.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

Effect of location-awareness on rendezvous behaviour.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

Requirements gathering with Alzheimer's patients and caregivers.
Proceedings of the ACM SIGACCESS Conference on Computers and Accessibility, 2005

2004
From cookies to puppies to athletes: designing a visual audience voting system.
Proceedings of the Extended abstracts of the 2004 Conference on Human Factors in Computing Systems, 2004

2002
An architecture in support of universal access to electronic commerce.
Inf. Softw. Technol., 2002


  Loading...