Author image not provided
 Kirstie A Hawkey

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article6.29
Citation Count371
Publication count59
Publication years2004-2017
Available for download43
Average downloads per article509.09
Downloads (cumulative)21,891
Downloads (12 Months)1,452
Downloads (6 Weeks)150
SEARCH
ROLE
Arrow RightAuthor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


59 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 59
Result page: 1 2 3

Sort by:

1 published by ACM
August 2017 SIGDOC '17: Proceedings of the 35th ACM International Conference on the Design of Communication
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 56,   Downloads (Overall): 56

Full text available: PDFPDF
In this paper, we report applying participatory design research on the development of effective privacy compliance framework in the context of healthcare applications provided to IT designers. We aim to bridge the gap between privacy law designers and privacy IT designers by expanding the concept of end-user participation. We propose ...
Keywords: electronic health records, privacy, personal health records, e-health, personal health information, privacy legislations, electronic medical records, patient portals

2 published by ACM
May 2016 CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 9,   Downloads (12 Months): 139,   Downloads (Overall): 307

Full text available: PDFPDF
Given the widespread adoption of mobile devices and the private personal and work information they carry, casual or deliberate shoulder surfing is an increasing concern with these devices. We iteratively designed a tablet interface that detects when people nearby are looking at the screen, providing awareness through glyph notifications, and ...
Keywords: mobile interface, proxemics interaction, shoulder surfing, mobile content privacy management, tablet

3 published by ACM
February 2016 HotMobile '16: Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 42,   Downloads (Overall): 150

Full text available: PDFPDF
Utilizing 3D models for repair operations is crucial to mechanical engineers and exploded view diagrams are an effective way to explore the inner structure of models. We evaluate a low-complexity scale-based exploded view method designed to help find and select small and occluded objects within 3D models on mobile devices. ...
Keywords: 3d selection, exploded view, mobile interaction

4
July 2015 International Journal of Mobile Human Computer Interaction: Volume 7 Issue 3, July 2015
Publisher: IGI Global
Bibliometrics:
Citation Count: 1

In hospitals, offices and other settings, professionals face the challenge of accessing and sharing sensitive content in public areas. As tablets become increasingly adopted in work environments, it is important to explore ways to support privacy that are appropriate for tablet use in dynamic, mobile workflows. In this research we ...
Keywords: mHealth, Privacy Enhancement, Tablet Interface, Notification, Proxemic Interactions

5
July 2015 International Journal of Mobile Human Computer Interaction: Volume 7 Issue 3, July 2015
Publisher: IGI Global
Bibliometrics:
Citation Count: 0

In hospitals, offices and other settings, professionals face the challenge of accessing and sharing sensitive content in public areas. As tablets become increasingly adopted in work environments, it is important to explore ways to support privacy that are appropriate for tablet use in dynamic, mobile workflows. In this research we ...
Keywords: mHealth, Privacy Enhancement, Tablet Interface, Notification, Proxemic Interactions

6 published by ACM
April 2015 CHI EA '15: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 2,   Downloads (12 Months): 49,   Downloads (Overall): 160

Full text available: PDFPDF
As smartphones and tablets are now widespread, accessing or even sharing sensitive content in public areas has become commonplace. This applies to both personal contexts (e.g. checking banking information in a coffee shop) and professional contexts (e.g. sharing patient information in a hospital ward). It is important to explore ways ...
Keywords: mobile interface, proxemics interaction, visual privacy

7
July 2014 Human-Computer Interaction: Volume 29 Issue 4
Publisher: L. Erlbaum Associates Inc.
Bibliometrics:
Citation Count: 2


8 published by ACM
June 2014 MIDI '14: Proceedings of the 2014 Mulitmedia, Interaction, Design and Innovation International Conference on Multimedia, Interaction, Design and Innovation
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 3,   Downloads (Overall): 37

Full text available: PDFPDF
Paper-based user manuals that provide assembly and disassembly instructions often do so with a combination of diagrams supported with textual information that clarifies how to perform the tasks. Mobile devices are emerging as a multimedia platform for providing on-demand training due to their portability. Mobile devices have limited screen size; ...
Keywords: Multi-media-interface, cognitive load, just-in-time learning, mobile device

9 published by ACM
April 2014 CHI EA '14: CHI '14 Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4,   Downloads (12 Months): 23,   Downloads (Overall): 112

Full text available: PDFPDF
Visualization is an effective way to explore and understand abstract data. While many tool domains have benefitted from the use of visualizations, they currently are in limited use in system administrator tools. The long-term objective of this research is to ease the work of sys admins through enhanced visualizations. Before ...
Keywords: system administrator, information technology management, visualization, system models

10 published by ACM
November 2013 ACM Transactions on Internet Technology (TOIT): Volume 13 Issue 1, November 2013
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 4,   Downloads (12 Months): 83,   Downloads (Overall): 586

Full text available: PDFPDF
OpenID and OAuth are open and simple Web SSO protocols that have been adopted by major service providers, and millions of supporting Web sites. However, the average user’s perception of Web SSO is still poorly understood. Through several user studies, this work investigates users’ perceptions and concerns when using Web ...
Keywords: usable security, OpenID, Web single sign-on, OAuth

11
December 2012 Computers and Graphics: Volume 36 Issue 8, December, 2012
Publisher: Pergamon Press, Inc.
Bibliometrics:
Citation Count: 0


12 published by ACM
October 2012 GROUP '12: Proceedings of the 17th ACM international conference on Supporting group work
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 11,   Downloads (Overall): 66

Full text available: PDFPDF
Collaboration is critical to the management of modern computer systems. At every scale, making computers work is a collective task, from enterprise systems where teams of disparate specialists work together to understand, manage, and maintain vast complex IT infrastructures, all the way down to individuals seeking online, family, and co-worker ...
Keywords: it management, chimit, hic

13
June 2012 Computers and Security: Volume 31 Issue 4, June, 2012
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 7

OpenID 2.0 is a user-centric Web single sign-on protocol with over one billion OpenID-enabled user accounts, and tens of thousands of supporting websites. While the security of the protocol is clearly critical, so far its security analysis has only been done in a partial and ad-hoc manner. This paper presents ...
Keywords: Web single sign-on, Security protocol analysis, Authentication, Web application security, Empirical evaluation, OpenID

14 published by ACM
February 2012 CSCW '12: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 3,   Downloads (12 Months): 19,   Downloads (Overall): 230

Full text available: PDFPDF
In this paper we describe LACOME, which is a collaboration system that allows multiple users to simultaneously publish their computer desktops to a shared large screen display, and also allows other users to interact with the displayed information on a variety of semantic levels. LACOME features our LSO (Large Screen ...
Keywords: collocated collaboration, large shared display, window manipulation

15 published by ACM
July 2011 SOUPS '11: Proceedings of the Seventh Symposium on Usable Privacy and Security
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 6,   Downloads (12 Months): 24,   Downloads (Overall): 442

Full text available: PDFPDF
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, standard usability heuristics are hard to apply as IT security management occurs within a complex and collaborative context that involves diverse stakeholders. We propose a set of ITSM usability heuristics ...
Keywords: complex systems, IT security management, computer supported cooperative work, heuristic evaluation

16 published by ACM
July 2011 SOUPS '11: Proceedings of the Seventh Symposium on Usable Privacy and Security
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 8,   Downloads (12 Months): 38,   Downloads (Overall): 341

Full text available: PDFPDF
We used an iterative process to design firewall warnings in which the functionality of a personal firewall is visualized based on a physical security metaphor. We performed a study to determine the degree to which our proposed warnings are understandable for users, and the degree to which they convey the ...
Keywords: usable security, warning, mental model, personal firewall, physical security metaphor

17 published by ACM
July 2011 SOUPS '11: Proceedings of the Seventh Symposium on Usable Privacy and Security
Publisher: ACM
Bibliometrics:
Citation Count: 16
Downloads (6 Weeks): 4,   Downloads (12 Months): 68,   Downloads (Overall): 1,014

Full text available: PDFPDF
OpenID is an open and promising Web single sign-on (SSO) solution. This work investigates the challenges and concerns web users face when using OpenID for authentication, and identifies what changes in the login flow could improve the users' experience and adoption incentives. We found our participants had several behaviors, concerns, ...
Keywords: OpenID, identity enabled browser, web single sign-on

18 published by ACM
July 2011 SOUPS '11: Proceedings of the Seventh Symposium on Usable Privacy and Security
Publisher: ACM
Bibliometrics:
Citation Count: 16
Downloads (6 Weeks): 4,   Downloads (12 Months): 61,   Downloads (Overall): 440

Full text available: PDFPDF
We replicated and extended a 2008 study conducted at CMU that investigated the effectiveness of SSL warnings. We adjusted the experimental design to mitigate some of the limitations of that prior study; adjustments include allowing participants to use their web browser of choice and recruiting a more representative user sample. ...
Keywords: study replication, SSL warnings, experimental design, study environment bias, usable security

19
June 2011 Cognition, Technology and Work: Volume 13 Issue 2, June 2011
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 5

Information technology security management (ITSM) entails significant challenges, including the distribution of tasks and stakeholders across the organization, the need for security practitioners to cooperate with others, and technological complexity. We investigate the organizational processes in ITSM using qualitative analysis of interviews with ITSM practitioners. To account for the distributed ...
Keywords: Computer supported cooperative work, Transactive memory, Information technology security management, Mutual understanding, Risk, Cues and norms, Distributed cognition, Notifications

20 published by ACM
May 2011 CHI EA '11: CHI '11 Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 2,   Downloads (12 Months): 19,   Downloads (Overall): 211

Full text available: PDFPDF
We used an iterative process to design personal firewall warnings in which the functionality of a firewall is visualized based on a physical security mental model. We performed a study to determine the degree to which our proposed warnings are understandable for our participants, and the degree to which they ...
Keywords: usable security, warning, firewall, mental model



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us