Kirstie Hawkey
According to our database1,
Kirstie Hawkey
authored at least 68 papers
between 2002 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
2002
2004
2006
2008
2010
2012
2014
2016
2018
2020
0
5
10
1
1
1
1
2
1
2
2
3
1
1
1
1
1
1
1
4
1
2
2
6
7
8
6
2
2
6
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
MAR: A Study of the Impact of Positive and Negative Reinforcement on Medication Adherence Reminders.
Proceedings of the 8th IEEE International Conference on Serious Games and Applications for Health, 2020
2019
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Toward Applying Online Privacy Patterns Based on the Design Problem: A Systematic Review.
Proceedings of the Design, User Experience, and Usability: Theory and Practice, 2018
2017
Participatory design research to understand the legal and technological perspectives in designing health information technology.
Proceedings of the 35th ACM International Conference on the Design of Communication, 2017
2016
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016
Who Are You? It Depends (On What You Ask Me!): Context-Dependent Dynamic User Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia's Personal Health Information Act.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Int. J. Mob. Hum. Comput. Interact., 2015
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 2015
2014
Understanding the Tradeoffs of Mobile Device Output Modalities in Just-in-time Learning of Mechanical Tasks.
Proceedings of the 2014 Mulitmedia, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2013
Proceedings of the Distributed User Interfaces: Usability and Collaboration, 2013
Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model.
ACM Trans. Internet Techn., 2013
2012
Report from the 5th ACM Symposium on Computer Human Interaction for Management of IT.
login Usenix Mag., 2012
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures.
Comput. Secur., 2012
Proceedings of the ACM 2012 International Conference on Support Group Work, 2012
Proceedings of the CSCW '12 Computer Supported Cooperative Work, Seattle, WA, USA, February 11-15, 2012, 2012
2011
Toward understanding distributed cognition in IT security management: the role of cues and norms.
Cogn. Technol. Work., 2011
Proceedings of the Symposium On Usable Privacy and Security, 2011
On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings.
Proceedings of the Symposium On Usable Privacy and Security, 2011
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings.
Proceedings of the Symposium On Usable Privacy and Security, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
Preparation, detection, and analysis: the diagnostic work of IT security incident response.
Inf. Manag. Comput. Secur., 2010
The benefits of more electronic screen space on students' retention of material in classroom lectures.
Comput. Educ., 2010
Do windows users follow the principle of least privilege?: investigating user account control practices.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the Graphics Interface 2010 Conference, May 31, 2010
Proceedings of the 6th Workshop on Digital Identity Management, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
An integrated view of human, organizational, and technological challenges of IT security management.
Inf. Manag. Comput. Secur., 2009
Security practitioners in context: Their activities and interactions with other stakeholders within organizations.
Int. J. Hum. Comput. Stud., 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
A case study of enterprise identity management system adoption in an insurance organization.
Proceedings of the 3rd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2009
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Pers. Ubiquitous Comput., 2008
IEEE Internet Comput., 2008
Int. J. Hum. Comput. Interact., 2008
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008
Exploring a human centered approach to managing visual privacy concerns during collaboration.
Proceedings of the 3rd ACM Workshop on Human-Centered Computing, 2008
Human, Organizational and Technological Challenges of Implementing IT Security in Organizations.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2008
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
Privacy in the open: how attention mediates awareness and privacy in open-plan offices.
Proceedings of the 2007 International ACM SIGGROUP Conference on Supporting Group Work, 2007
Proceedings of the Graphics Interface 2007 Conference, May 28-30, 2007, Montreal, Canada, 2007
2006
Proceedings of the 15th international conference on World Wide Web, 2006
Keeping up appearances: understanding the dimensions of incidental information privacy.
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006
2005
Interact. Comput., 2005
Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, 2005
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005
Privacy gradients: exploring ways to manage incidental information during co-located collaboration.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005
Proceedings of the ACM SIGACCESS Conference on Computers and Accessibility, 2005
2004
Proceedings of the Extended abstracts of the 2004 Conference on Human Factors in Computing Systems, 2004
2002
Inf. Softw. Technol., 2002