Kirstie Hawkey
Kirstie Hawkey
Senior Instructor, Dalhousie University
Verified email at cs.dal.ca
Title
Cited by
Cited by
Year
An integrated view of human, organizational, and technological challenges of IT security management
R Werlinger, K Hawkey, K Beznosov
Information Management & Computer Security, 2009
2172009
Preparation, detection, and analysis: the diagnostic work of IT security incident response
R Werlinger, K Muldner, K Hawkey, K Beznosov
Information Management & Computer Security, 2010
1442010
What makes users refuse web single sign-on? An empirical investigation of OpenID
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
1142011
Do Windows users follow the principle of least privilege? Investigating user account control practices
S Motiee, K Hawkey, K Beznosov
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010
1112010
On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings
A Sotirakopoulos, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-18, 2011
1072011
The proximity factor: impact of distance on co-located collaboration
K Hawkey, M Kellar, D Reilly, T Whalen, KM Inkpen
Proceedings of the 2005 international ACM SIGGROUP conference on Supporting …, 2005
832005
Exploring display factors that influence co-located collaboration: angle, size, number, and user arrangement
K Inkpen, K Hawkey, M Kellar, R Mandryk, K Parker, D Reilly, S Scott, ...
Proc. HCI international 2005, 2005
812005
Requirements gathering with alzheimer's patients and caregivers
K Hawkey, KM Inkpen, K Rockwood, M McAllister, J Slonim
Proceedings of the 7th international ACM SIGACCESS conference on Computers …, 2005
802005
A billion keys, but few locks: the crisis of web single sign-on
ST Sun, Y Boshmaf, K Hawkey, K Beznosov
Proceedings of the 2010 New Security Paradigms Workshop, 61-72, 2010
782010
Heuristics for evaluating IT security management tools
P Jaferian, K Hawkey, A Sotirakopoulos, M Velez-Rojas, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
762011
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures
ST Sun, K Hawkey, K Beznosov
Computers & Security 31 (4), 465-483, 2012
702012
Security practitioners in context: Their activities and interactions with other stakeholders within organizations
R Werlinger, K Hawkey, D Botta, K Beznosov
International Journal of Human-Computer Studies 67 (7), 584-606, 2009
702009
The challenges of using an intrusion detection system: is it worth the effort?
R Werlinger, K Hawkey, K Muldner, P Jaferian, K Beznosov
Proceedings of the 4th symposium on Usable privacy and security, 107-118, 2008
702008
Privacy in the open: how attention mediates awareness and privacy in open-plan offices
JP Birnholtz, C Gutwin, K Hawkey
Proceedings of the 2007 international ACM conference on Supporting group …, 2007
622007
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings
F Raja, K Hawkey, S Hsu, KLC Wang, K Beznosov
Proceedings of the seventh symposium on usable privacy and security, 1-20, 2011
542011
Guidelines for designing it security management tools
P Jaferian, D Botta, F Raja, K Hawkey, K Beznosov
Proceedings of the 2nd ACM Symposium on Computer Human interaction For …, 2008
442008
I did it because I trusted you”: Challenges with the study environment biasing participant behaviours
A Sotirakopoulos, K Hawkey, K Beznosov
SOUPS Usable Security Experiment Reports (USER) Workshop, 2010
412010
Toward understanding distributed cognition in IT security management: the role of cues and norms
D Botta, K Muldner, K Hawkey, K Beznosov
Cognition, Technology & Work 13 (2), 121-134, 2011
392011
Human, organizational, and technological factors of IT security
K Hawkey, D Botta, R Werlinger, K Muldner, A Gagne, K Beznosov
CHI'08 extended abstracts on Human factors in computing systems, 3639-3644, 2008
392008
Revealing hidden context: improving mental models of personal firewall users
F Raja, K Hawkey, K Beznosov
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
372009
The system can't perform the operation now. Try again later.
Articles 1–20