The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kirstie Hawkey: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kirstie Hawkey, Kori M. Inkpen, Kenneth Rockwood, Michael McAllister, Jacob Slonim
    Requirements gathering with Alzheimer's patients and caregivers. [Citation Graph (0, 0)][DBLP]
    ASSETS, 2005, pp:142-149 [Conf]
  2. David Dearman, Kirstie Hawkey, Kori M. Inkpen
    Effect of location-awareness on rendezvous behaviour. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2005, pp:1929-1932 [Conf]
  3. Kirstie Hawkey, Kori M. Inkpen
    Privacy gradients: exploring ways to manage incidental information during co-located collaboration. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2005, pp:1431-1434 [Conf]
  4. Kirstie Hawkey, Kori Inkpen
    Web browsing today: the impact of changing contexts on user activity. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2005, pp:1443-1446 [Conf]
  5. Kirstie Hawkey, Kori M. Inkpen
    Keeping up appearances: understanding the dimensions of incidental information privacy. [Citation Graph (0, 0)][DBLP]
    CHI, 2006, pp:821-830 [Conf]
  6. Kirstie Hawkey, Melanie Kellar, Bonnie MacKay, Karen Parker, Derek F. Reilly
    From cookies to puppies to athletes: designing a visual audience voting system. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2004, pp:1641-1645 [Conf]
  7. Melanie Kellar, Derek F. Reilly, Kirstie Hawkey, Malcolm E. Rodgers, Bonnie MacKay, David Dearman, Vicki Ha, W. Joseph MacInnes, Michael N. Nunes, Karen Parker, Tara Whalen, Kori M. Inkpen
    It's a jungle out there: practical considerations for evaluation in the city. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2005, pp:1533-1536 [Conf]
  8. Kirstie Hawkey, Melanie Kellar, Derek F. Reilly, Tara Whalen, Kori M. Inkpen
    The proximity factor: impact of distance on co-located collaboration. [Citation Graph (0, 0)][DBLP]
    GROUP, 2005, pp:31-40 [Conf]
  9. Kirstie Hawkey, Kori M. Inkpen
    Examining the content and privacy of web browsing incidental information. [Citation Graph (0, 0)][DBLP]
    WWW, 2006, pp:123-132 [Conf]
  10. Theodore Chiasson, Kirstie Hawkey, Michael McAllister, Jacob Slonim
    An architecture in support of universal access to electronic commerce. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2002, v:44, n:5, pp:279-289 [Journal]
  11. David Dearman, Kirstie Hawkey, Kori M. Inkpen
    Rendezvousing with location-aware devices: Enhancing social coordination. [Citation Graph (0, 0)][DBLP]
    Interacting with Computers, 2005, v:17, n:5, pp:542-566 [Journal]
  12. Kirstie Hawkey, Kori M. Inkpen
    PrivateBits: managing visual privacy in web browsers. [Citation Graph (0, 0)][DBLP]
    Graphics Interface, 2007, pp:215-223 [Conf]

  13. Secure Web 2.0 Content Sharing Beyond Walled Gardens. [Citation Graph (, )][DBLP]


  14. Security practitioners in context: their activities and interactions. [Citation Graph (, )][DBLP]


  15. Human, organizational, and technological factors of IT security. [Citation Graph (, )][DBLP]


  16. Towards improving mental models of personal firewall users. [Citation Graph (, )][DBLP]


  17. Investigating user account control practices. [Citation Graph (, )][DBLP]


  18. Investigating an appropriate design for personal firewalls. [Citation Graph (, )][DBLP]


  19. Privacy in the open: how attention mediates awareness and privacy in open-plan offices. [Citation Graph (, )][DBLP]


  20. Exploring a human centered approach to managing visual privacy concerns during collaboration. [Citation Graph (, )][DBLP]


  21. The challenges of using an intrusion detection system: is it worth the effort? [Citation Graph (, )][DBLP]


  22. A multi-method approach for user-centered design of identity management systems. [Citation Graph (, )][DBLP]


  23. Revealing hidden context: improving mental models of personal firewall users. [Citation Graph (, )][DBLP]


  24. Do windows users follow the principle of least privilege?: investigating user account control practices. [Citation Graph (, )][DBLP]


  25. Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens. [Citation Graph (, )][DBLP]


  26. Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0. [Citation Graph (, )][DBLP]


  27. Guidelines for designing IT security management tools. [Citation Graph (, )][DBLP]


  28. A case study of enterprise identity management system adoption in an insurance organization. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002