Search the dblp DataBase
Kirstie Hawkey :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Kirstie Hawkey , Kori M. Inkpen , Kenneth Rockwood , Michael McAllister , Jacob Slonim Requirements gathering with Alzheimer's patients and caregivers. [Citation Graph (0, 0)][DBLP ] ASSETS, 2005, pp:142-149 [Conf ] David Dearman , Kirstie Hawkey , Kori M. Inkpen Effect of location-awareness on rendezvous behaviour. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2005, pp:1929-1932 [Conf ] Kirstie Hawkey , Kori M. Inkpen Privacy gradients: exploring ways to manage incidental information during co-located collaboration. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2005, pp:1431-1434 [Conf ] Kirstie Hawkey , Kori Inkpen Web browsing today: the impact of changing contexts on user activity. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2005, pp:1443-1446 [Conf ] Kirstie Hawkey , Kori M. Inkpen Keeping up appearances: understanding the dimensions of incidental information privacy. [Citation Graph (0, 0)][DBLP ] CHI, 2006, pp:821-830 [Conf ] Kirstie Hawkey , Melanie Kellar , Bonnie MacKay , Karen Parker , Derek F. Reilly From cookies to puppies to athletes: designing a visual audience voting system. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2004, pp:1641-1645 [Conf ] Melanie Kellar , Derek F. Reilly , Kirstie Hawkey , Malcolm E. Rodgers , Bonnie MacKay , David Dearman , Vicki Ha , W. Joseph MacInnes , Michael N. Nunes , Karen Parker , Tara Whalen , Kori M. Inkpen It's a jungle out there: practical considerations for evaluation in the city. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2005, pp:1533-1536 [Conf ] Kirstie Hawkey , Melanie Kellar , Derek F. Reilly , Tara Whalen , Kori M. Inkpen The proximity factor: impact of distance on co-located collaboration. [Citation Graph (0, 0)][DBLP ] GROUP, 2005, pp:31-40 [Conf ] Kirstie Hawkey , Kori M. Inkpen Examining the content and privacy of web browsing incidental information. [Citation Graph (0, 0)][DBLP ] WWW, 2006, pp:123-132 [Conf ] Theodore Chiasson , Kirstie Hawkey , Michael McAllister , Jacob Slonim An architecture in support of universal access to electronic commerce. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 2002, v:44, n:5, pp:279-289 [Journal ] David Dearman , Kirstie Hawkey , Kori M. Inkpen Rendezvousing with location-aware devices: Enhancing social coordination. [Citation Graph (0, 0)][DBLP ] Interacting with Computers, 2005, v:17, n:5, pp:542-566 [Journal ] Kirstie Hawkey , Kori M. Inkpen PrivateBits: managing visual privacy in web browsers. [Citation Graph (0, 0)][DBLP ] Graphics Interface, 2007, pp:215-223 [Conf ] Secure Web 2.0 Content Sharing Beyond Walled Gardens. [Citation Graph (, )][DBLP ] Security practitioners in context: their activities and interactions. [Citation Graph (, )][DBLP ] Human, organizational, and technological factors of IT security. [Citation Graph (, )][DBLP ] Towards improving mental models of personal firewall users. [Citation Graph (, )][DBLP ] Investigating user account control practices. [Citation Graph (, )][DBLP ] Investigating an appropriate design for personal firewalls. [Citation Graph (, )][DBLP ] Privacy in the open: how attention mediates awareness and privacy in open-plan offices. [Citation Graph (, )][DBLP ] Exploring a human centered approach to managing visual privacy concerns during collaboration. [Citation Graph (, )][DBLP ] The challenges of using an intrusion detection system: is it worth the effort? [Citation Graph (, )][DBLP ] A multi-method approach for user-centered design of identity management systems. [Citation Graph (, )][DBLP ] Revealing hidden context: improving mental models of personal firewall users. [Citation Graph (, )][DBLP ] Do windows users follow the principle of least privilege?: investigating user account control practices. [Citation Graph (, )][DBLP ] Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens. [Citation Graph (, )][DBLP ] Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0. [Citation Graph (, )][DBLP ] Guidelines for designing IT security management tools. [Citation Graph (, )][DBLP ] A case study of enterprise identity management system adoption in an insurance organization. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs