CSCI 4169 / CSCI 6307 Usable Privacy & Security (Summer 2013; Dalhousie University) CSCI 2141 Intro to Database Systems (Winter 2013; Dalhousie University) CSCI 4163 / CSCI 6610 (was 6904) Human Computer Interaction (Winter 2013, Summer 2011; Dalhousie University) CSCI 6055 (was 6903) Research Methods & Statistics (Winter 2013, Fall 2011; Dalhousie University) CSCI 3130 Software Engineering (Summer 2011, Dalhousie University)
EECE 320 Discrete Structures and Algorithms (Fall 2010, University of British Columbia)
CPSC 544 Graduate Instructor of Introduction to HCI Methods (Fall 2010, University of British Columbia) CPSC530b Co-instructor of Topics in Information Processing: Field Research (Winter 2009, University of British Columbia) CPSC 544 Human Computer Interaction (Fall 2008, University of British Columbia) CSCI 3120 Operating Systems (Summer 2003, Dalhousie University)
CSCI 1100/1202 Computer Science 1/Computer Science 1 for Science Students (Winter 2002, Dalhousie University)
Research Interests
Human Computer Interaction (HCI), Usable Privacy and Security, Computer-Supported Cooperative Work (CSCW), Personal Information Management (PIM), Information Visualization, Mobile Devices, Assistive Technology (persons with Alzheimer's Disease), and Web Browsing Behaviour.
Publications
Refereed journal articles, book chapters
Botta, D., Muldner, K., Hawkey, K., and Beznosov, K. (2010). Toward understanding distributed cognition in IT security management: The roles of cues and norms. Int. Journal of Cognition, Technology & Work. Online First, September 2010. DOI: 10.1007/s10111-010-0159-y (14 pages).
Lanir, J., Booth, K.S., and Hawkey, K. (2010). The Benefits of More Electronic Screen Space on Students' Retention of Material in Classroom Lectures. Computers & Education. 55(2): 892-903.
Werlinger, R., Muldner, K., Hawkey, K., and Beznosov, K. (2010). Preparation, Detection, and Analysis: the Diagnostic Work of IT Security Incident Response. Journal of Information Management & Computer Security. 18(1): 26-42.
Werlinger, R., Hawkey, K., Botta, D., and Beznosov, K. (2009). Security Practitioners in Context: Their Activities and Interactions with Other Stakeholders within Organizations. Int. Journal of Human-Computer Studies. 67(7): 584-606.
Werlinger, R., Hawkey, K., and Beznosov, K. (2009). An Integrated View of Human, Organizational, and Technological Challenges of IT Security Management. Journal of Information Management & Computer Security. 17(1):4-19.
Hawkey, K., Muldner, K, and Beznosov, K. (2008). Searching for the Right Fit: Balancing IT Security Management Model Tradeoffs. IEEE Internet Computing Magazine. 12(3):22-30.
Hawkey, K. (2008). Privacy issues associated with Web logging data. In B. J. Jansen, A. Spink & I. Taksa (Eds.), Handbook of Research on Web Log Analysis. Hershey, PA: IGI. 80-99.
Hawkey, K. and Kellar, M. (2008). Recommendations for reporting Web usage studies. In B. J. Jansen, A. Spink & I. Taksa (Eds.), Handbook of Research on Web Log Analysis. Hershey, PA: IGI. 181-205.
Kellar, M., Hawkey, K., Inkpen, K.M., and Watters, C. (2008).
Challenges of Capturing Natural Web-based User Behaviours. International
Journal of Human Computer Interaction, 24(4):385-409.
Tan, D.S., Gergle, D., Mandryk, R., Inkpen, K., Kellar, M., Hawkey, K. and Czerwinski, M. (2008). Using Job-Shop Scheduling Tasks for Evaluating Collocated Collaboration. User-Centred Design and Evaluation of Services for Human-Human-Communication and Collaboration, a Special Issue of Personal and Ubiquitous Computing, 12(3), 255-257(Springer Online First: 24 February 2007, 14 pages).
Dearman, D., Hawkey, K., and Inkpen, K.M. (2005)
Rendezvousing with Location-Aware Devices: Enhancing Social Coordination.
Interacting
with Computers, 17(5),
542-566.
Chiasson, T., Hawkey, K., McAllister, M., and
Slonim, J. (2002) An architecture in support of universal access to
electronic commerce. Journal of Information and Software Technology.
44(5): 279-289.
Other refereed contributions
Sun, S.T., Hawkey, K., and Beznosov, K. (2010). OpenIDemail Enabled Browser: Towards Fixing the Broken Web Single Sign-On Triangle. Proc. of 6th ACM Workshop on Digital Identity Management (DIM 2010), Chicago, IL, October 8, 2010, 49-58.
Raja, F., Hawkey, K., Jaferian, P., Booth, K.S., and Beznosov, K. (2010). It's Too Complicated, So I Turned It Off! Expectations, Perceptions, and Misconceptions of Personal Firewalls. Accepted August 7, 2010 to the 3rd ACM Workshop on Assurable and Usable Security Configuration (SafeConfig 10), Chicago, IL, October 4, 2010, 53-62.
Sun, S.T., Boshmaf, Y., Hawkey, K., and Beznosov, K. (2010). More Than a Billion Keys, but Few Locks: The Crisis of Web Single Sign-On. Presented at the New Security Paradigms Workshop (NSPW 2010), Concord, MA, September 21-23, 2010, 61-72.
Motiee, S.*, Hawkey, K., Beznosov, K. (2010). Do Windows Users Follow the Principle of Least Privilege? Investigating User Account Control Practices. Proc. of Symposium on Usable Privacy and Security (SOUPS 2010), Redmond, WA, July 14-16, 2010, Article 1:1-13 (~25% Acceptance Rate).
Maksakov, E., Booth, K.S., and Hawkey, K. (2010). Whale Tank Virtual Reality. Proc. of Graphics Interface (GI 2010), Ottawa, ON, May 31-June 2, 2010, 185-192. (~33% Acceptance Rate).
Sun, S.T., Hawkey, K., and Beznosov, K. (2009). Secure Web 2.0 Content Sharing Beyond Walled Gardens. Proc. of Annual Computer Security Applications Conference (ACSAC 2009), Honolulu, HI, December 7-11, 2009, 409-418. (~19% Acceptance Rate).
Jaferian, P., Botta, D., Hawkey, K., and Beznosov, K. (2009). A Case Study of IdM Adoption in an Insurance Organization. Proc. of ACM Symposium on Human Computer Interaction for Management of Information Technology (CHIMIT 2009), Baltimore, MD, November 7-8, 2009, 46-55. (~33% Acceptance Rate).
Raja, F., Hawkey, K., and Beznosov, K. (2009). Revealing Hidden Context: Improving Mental Models of Personal Firewall Users. Proc. of the Symposium on Usable Privacy and Security (SOUPS 2009), Mountain View, CA, July 15-17, 2009, Paper 1:1-12. (~31% Acceptance Rate).
Werlinger, R., Muldner, K., Hawkey, K., and Beznosov, K. (2009). Towards Understanding Diagnostic Work during the Detection and Investigation of Security Incidents. Proc. of Int. Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, June 25-26, 2009, 119-132.
Jaferian, P., Botta, D., Raja, F., Hawkey, K., and Beznosov, K. (2008). Guidelines for design of IT security management tools. Proc. of ACM Symposium on Human Computer Interaction for Management of Information Technology (CHIMIT 2008), San Diego, CA, November 14-15, 2008 (~29% Acceptance Rate).
Hawkey, K. (2008). Exploring a Human-Centered Approach to Managing Visual Privacy Concerns during Collaboration. Proc. of 3rd ACM International Workshop on Human-Centered Computing (HCC 2008). Vancouver, BC, October 31, 2008, 69-76 (~73% Acceptance Rate).
Werlinger, R., Hawkey, K., Muldner, K., Jaferian, P., and Beznosov, K. (2008). The Challenges of Using an Intrusion Detection System: Is It Worth the Effort? Proc. of Symposium on Usable Privacy and Security (SOUPS 2008), Pittsburgh, PA, July 23-25, 2008, 107-116 (~26% Acceptance Rate).
Werlinger, R., Hawkey, K., and Beznosov, K. (2008). Security practitioners in context: Their activities and interactions. Ext. Abstracts of ACM Conf. on Human Factors in Computing Systems (CHI 2008). Florence, Italy, 3789-3794. (Student Research Competition, ~30% Acceptance Rate).
Werlinger, R., Hawkey, K., and Beznosov, K. (2008). Human, Organizational, and Technological Challenges of Implementing IT Security in Organizations. Proc. of Int. Symposium on Human Aspects of Information Security & Assurance (HAISA 2008), Plymouth, UK, July 8-9, 2008, 35-47. (Best Paper Award).
Birnholtz, J., Gutwin, C., and Hawkey, K. (2007) Privacy in the Open: How Attention Mediates Awareness and Privacy in Open-Plan Offices. Proceedings of Group 2007: Int. Conf. on Supporting Group Work, Florida, USA, November 2007, 51-60. Acceptance Rate: ~29%.
Hawkey, K. and Inkpen, K.M. (2007). PrivateBits: Managing Visual Privacy within Web Browsers, Graphics Interface 2007, Montreal, PQ, May 2007, 215-223.
(pdf). Acceptance rate: ~41%.
Hawkey, K. and Inkpen, K.M. (2006). Examining the Content and
Privacy of Web Browsing Incidental Information. Proceedings of WWW 2006, Edinburgh, UK,
May 2006, 123-132. (pdf). Acceptance rate: ~11%.
Hawkey, K. and Inkpen, K.M. (2006). Keeping up Appearances:
Understanding the Dimensions of Incidental Information Privacy. Proceedings of CHI 2006,
Montreal, PQ, April 2006, 821-830. (pdf).
Acceptance rate: ~23%.
Hawkey, K., Kellar, M., Reilly, D.,
Whalen, T., and Inkpen, K.M.(2005). The Proximity Factor: Impact of
Distance on Co-located Collaboration. In proceedings of the ACM
International Conference on Supporting Group Work (GROUP). Sanibel Island,
FL, USA, November 2005, 31-40. http://doi.acm.org/10.1145/1099203.1099209 Acceptance rate: ~26%
(27/102 submissions)
Hawkey, K., Inkpen, K.M., Rockwood, K., McAllister, M. and Slonim, J.(2005) Requirements Gathering with
Alzheimer's Patients and Caregivers. In proceedings of the Seventh International
ACM SIGACCESS Conference on Computers and Accessibility (ASSETS).
Baltimore, MD, USA, October 2005, 142-149. http://doi.acm.org/10.1145/1090785.1090812
Acceptance rate: ~38% (23/60
submissions)
Inkpen, K.M., Hawkey,
K., Kellar, M., Mandryk, R.L., Parker, J.K., Reilly, D., Scott, S.D. and
Whalen, T. (2005) Exploring Display Factors that Influence Co-Located
Collaboration: Angle, Size, Number, and User Arrangement. In Proceedings of HCI
International 2005. Las Vegas, USA, July 2005. pdf Acceptance rate: ~39%
(referreed extended abstract)
Dearman, D., Hawkey, K., and Inkpen, K.M. (2005) Impact of
Location-Awareness on Rendezvous Behaviour and Communication. International Workshop on
Location- and Context-Awareness (LoCA 2005) in cooperation with
Pervasive 2005, May 12-13, 2005. Oberpfaffenhofen near Munich, Germany (paper presented at LoCA and
distributed to attendees, but withdrawn from printed proceedings)
Acceptance rate: ~39% (33/84 submissions)
Hawkey, K. and Inkpen, K.M. (2005)
Privacy gradients: exploring ways to manage incidental information during co-located collaboration. (Late Breaking Results: Short Papers) in Extended Abstracts of the Conference on Human Factors in Computing Systems (CHI 2005). Portland, OR, USA. pp. 1431 - 1434.
http://doi.acm.org/10.1145/1056808.1056934
Note: Incorrectly classified in proceedings as a poster. Acceptance rate: ~25%
Dearman, D., Hawkey, K., and Inkpen, K.M. (2005)
Effect of location-awareness on rendezvous behaviour.(Late Breaking Results: Short Papers) in Extended Abstracts of the Conference on Human Factors in Computing Systems (CHI 2005). Portland, OR, USA. pp. 1929 - 1932.
http://doi.acm.org/10.1145/1056808.1057059
Acceptance rate: ~25%
Hawkey, K. and Inkpen, K.M. (2005)
Web browsing today: the impact of changing contexts on user activity. (Late Breaking Results: Posters) in Extended Abstracts of the Conference on Human Factors in Computing Systems (CHI 2005). Portland, OR, USA. pp. 1443 - 1446.
http://doi.acm.org/10.1145/1056808.1056937 (poster)
Acceptance rate: ~40%
Kellar, M., Reilly, D., Hawkey, K., Rodgers, M., MacKay, B., Dearman, D., Ha, V., MacInnes, J.W., Nunes, M., Parker, J.K., Whalen, T., Inkpen, K.M. (2005)
It's a Jungle Out There: Practical Considerations for Evaluation in the City. (Late breaking Results: Posters) in Extended Abstracts of the Conference on Human Factors in Computing Systems (CHI 2005). Portland, OR, USA. pp. 1533 - 1536.
http://doi.acm.org/10.1145/1056808.1056959 (poster)
Acceptance rate: ~40%
Hawkey, K., Kellar, M., MacKay, B., Parker, J.K., and Reilly, D.. (2004)
Designing a visual audience voting system. (CHI 2004 Student Competition) in Extended Abstracts of the Conference on Human Factors in Computing Systems (CHI 2004), April 2004, Vienna, Austria, pp. 1641-1645.
http://doi.acm.org/10.1145/985921.986178 Finalists, 5th place.
Slonim, J., McAllister, M., Rockwood, K., Chiasson, T., Gates, C., and Hawkey, K. (2001) A Human-Centric Architecture for Personalization and Privacy. Presented at International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet (SSGRR'2001), L'Aquila: Italy, August 6-11, 2001, CD ROM.
Non-Reviewed Journal and Magazine Contributions
Edmonds, A., Hawkey, K., Jansen, B., Kellar, M. and Turnbull, D. (2007). Editorial: Introduction to the Special Issue on Logging Traces of Web Activity. Journal of Web Engineering, 6 (3): 193-195.
Sun, S.T., Pospisil, E., Muslukhov, I., Dindar, N., Hawkey, K., and Beznosov, K. (to appear). OpenID-Enabled Browser: Towards Usable and Secure Web Single Sign-On. Accepted February 11, 2011 to appear in Ext. Abstracts of ACM Conf. on Human Factors in Computing Systems (CHI 2011). (#226, Work in Progress, 6 pages, ~45% Acceptance Rate).
Raja, F., Hawkey, K., Hsu, S., Wang, K-L.C, and Beznosov, K. (to appear). Promoting a Physical Security Mental Model for Personal Firewall Warnings. Accepted February 11, 2011 to appear in Ext. Abstracts of ACM Conf. on Human Factors in Computing Systems (CHI 2011). (#724, Work in Progress, 6 pages, ~45% Acceptance Rate).
Jaferian, P., Hawkey, K., Sotirakopoulos, A., and Beznosov, K. (to appear). Heuristics for Evaluating IT Security Management Tools. Accepted February 11, 2011 to appear in Ext. Abstracts of ACM Conf. on Human Factors in Computing Systems (CHI 2011). (#740, Work in Progress, 6 pages, ~45% Acceptance Rate).
Hawkey, K. (to appear). Adapting to the changing needs of aircraft mechanics. Accepted March 1, 2011 to be presented at the Workshop on Dynamic Accessibility: Detecting and Accommodating Differences in Ability and Situation, CHI 2011, Vancouver, BC. (Position Statement, 3 pages).
Sun, S.T., Hawkey, K., and Beznosov, K. (2010). OpenIDemail Enabled Browser. Poster presentation at the Symposium on Usable Privacy and Security (SOUPS 2010) (#12, 2 pages).
Raja, F., Hawkey, K., Jaferian, P., Beznosov, K., and Booth, K.S. (2010). Expectations, Perceptions, and Misconceptions of Personal Firewalls. Poster presentation at the Symposium on Usable Privacy and Security (SOUPS 2010) (#13, 2 pages).
Sotirakopoulos, A., Hawkey, K., and Beznosov, K. (2010). Is there Really a Wolf? Validating and Extending a Study on the Effectiveness of SSL Warnings. Poster presentation at the Symposium on Usable Privacy and Security (SOUPS 2010) (#31, 2 pages).
Motiee, S., Hawkey, K., and Beznosov, K. (2010). The Challenges of Understanding Users' Security-related Knowledge, Behaviour, and Motivations. Proc. of SOUPS 2010 Usable Security Experiment Reports (USER) Workshop. (5 pages, ~57% Acceptance Rate)
Jaferian, P., Hawkey, K., and Beznosov, K. (2010). Challenges in Evaluating Complex IT Security Management Systems. Proc. of SOUPS 2010 Usable Security Experiment Reports (USER) Workshop. (6 pages, ~57% Acceptance Rate)
Sotirakopoulos, A., Hawkey, K., and Beznosov, K. (2010). "I did it because I trusted you": Challenges with the Study Environment Biasing Participant Behaviours. Proc. of SOUPS 2010 Usable Security Experiment Reports (USER) Workshop. (6 pages, ~57% Acceptance Rate)
Motiee, S., Hawkey, K., and Beznosov, K. (2010). Investigating User Account Control Practices. In Ext. Abstracts of ACM Conf. on Human Factors in Computing Systems (CHI 2010), Atlanta, GA, USA. 4129-4134. (Work-in-progress).
Raja, F., Hawkey, K., Beznosov, K., and Booth, K.S. (2010). Investigating an Appropriate Design for Personal Firewalls. In Ext. Abstracts of ACM Conf. on Human Factors in Computing Systems (CHI 2010), Atlanta, GA, USA. 4123-4128. (Work-in-progress).
Jaferian, P., Botta, D., Hawkey, K., and Beznosov, K. (2009). Towards Adapting Nielsen's Heuristics for Evaluation of IT Security Management Tools. Poster presented at the ACM Symposium on Human Computer Interaction for Management of Information Technology (CHIMIT 2009), Baltimore, MD, November 7-8, 2009. (3 pages).
Hawkey, K. (2009). Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0. Presented at Security and Privacy in Online Social Networking (SPOSN 09), a joint workshop of SocialCom-09 and PASSAT-09; in Proceedings of IEEE 2009 Int. Conf. on Computational Science and Engineering, Vancouver, BC, August 29-31, 2009, 990-995.
Sun, S.T., Hawkey, K., and Beznosov, K. (2009). Towards Enabling Web 2.0 Content Sharing Beyond Walled Gardens. Presented at Security and Privacy in Online Social Networking (SPOSN 09), a joint workshop of SocialCom-09 and PASSAT-09; in Proceedings of IEEE 2009 Int. Conf. on Computational Science and Engineering, Vancouver, BC, August 29-31, 2009, 979-984.
Jaferian, P., Botta, D., Hawkey, K., Beznosov, K. (2009). Towards Improving Identity Management Systems Through Heuristic Evaluation. Poster presented at the USENIX Security Symposium (USENIX-SEC 09), Montreal, Quebec, August 12-14, 2009. (4 pages).
Raja, F., Hawkey, K., Booth, K.S. (2009). Developing security and privacy requirements for a Local Area COllaborative Meeting Environment (LACOME). Poster presented at the USENIX Security Symposium (USENIX-SEC 09), Montreal, Quebec, August 12-14, 2009. (3 pages).
Motiee, S., Hawkey, K., and Beznosov, K. (2009). Towards Investigating User Account Control Practices in Windows Vista. Poster presented at the USENIX Security Symposium (USENIX-SEC 09), Montreal, Quebec, August 12-14, 2009. (3 pages).
Jaferian, P., Botta, D., Hawkey, K., Beznosov, K. (2009). A Multi-method Approach for User-centered Design of Identity Management Systems. Poster presented at the Symposium on Usable Privacy and Security (SOUPS 2009), Mountain View, CA, July 15-17, 2009. (2 pages).
MacKenzie, R., Booth, K.S., Hawkey, K., and Staub-French, S. (2009) Projected Fishtank Virtual Reality for Architectural Models. In Poster Abstracts of Graphics Interface, Kelowna, BC, 5-6.
MacKenzie, R., Liu, Z., Perswain, P., Hawkey, K., and Booth, K.S. (2009) Lacome: The Large Collaborative Meeting Environment. In Poster Abstracts of Graphics Interface, Kelowna, BC, 7-8.
Maksakov, E., Hawkey, K., and Booth, K.S. (2009). Whale Tank Virtual Reality: Collaboration in VR Using a Large Screen. In Poster Abstracts of Graphics Interface, Kelowna, BC, 9-10.
Raja, F., Hawkey, K., and Beznosov, K. (2009). Towards Improving Mental Models of Personal Firewall Users. In the Ext. Abstracts of ACM Conf. on Human Factors in Computing Systems (CHI 2009). Boston, MA, USA, 4633-4638. (Work-in-progress).
Hawkey, K. (2008). Usable Security for Persons with Alzheimer's Disease. Presented at the Symposium on Accessible Privacy and Security (SOAPS 2008), a SOUPS 2008 workshop. Pittsburgh, PA, July 23, 2008. (3 pages).
Jaferian, P., Botta, D., Hawkey, K., and Beznosov, K. (2008). Design Guidelines for IT security management tools. Presented at the Workshop on Usable IT Security Management (USM '08), a SOUPS 2008 workshop, Pittsburgh, PA, July 23, 2008. (6 pages).
Werlinger, R., Hawkey, K., and Beznosov, K. (2008). Responding to security incidents: Are security tools everything you need? Presented at FIRST 2008, Vancouver, Canada, June 2008. (Reviewed Extended Abstract, 4 pages).
Hawkey, K., Botta, D., Werlinger, R., Muldner, K., Gagne, A., and Beznosov, K. (2008). Human, Organizational, and Technological Factors of IT Security. Ext. Abstracts of ACM Conf. on Human Factors in Computing Systems (CHI 2008). Florence, Italy, 3639-3644. (Research Landscape).
Hawkey, K. (2008). A Model of Visual Privacy Concerns for PIM Systems. Personal Information Management Workshop (PIM 2008), a CHI 2008 2-Day Workshop. Florence, Italy, April 5-6, 2008 (Position paper).
Hawkey, K. and Inkpen, K.M. (2006). PrivateBits: Managing Visual Privacy in the Web Browser. Demonstration at CSCW 2006.
Banff, AB, November 4-8, 2006. (pdf)
Hawkey, K. and Inkpen, K.M. (2005) Managing the Privacy of Incidental Information During Collaboration. Poster Presentation at Graphics Interface 2005. Victoria, Canada, May 2005. (pdf) (poster)
Chung, H., Dearman, D., Ha, V.,Hawkey, K., Inkpen, I., Kellar, M., MacKay, B., Nunes, M., Parker, K., Reilly, D., Rodgers, M., and Whalen, T. (2004) Shared Annotations for Collaboration on Handheld Computers. Talk Session. Extended Abstracts of Dalhousie Computer Science In-House Conference. pp. 47-48
Hawkey, K. (2003). Design of a Device to Assist with Repetitive Questions in Patients with Alzheimer's Disease. Poster Session. Abstracts of Dalhousie Computer Science In-House Conference.
Hawkey, K. (2003). Design of a device to assist with repetitive questions in patients with Alzheimer's Disease. Poster Presentation at Graphics Interface 2003. Halifax, Canada, June 2003. (pdf) (poster)
Hawkey, K. (2002) Increasing Accessibility Through Personalization. Poster Session. Abstracts of Dalhousie Computer Science In-House Conference. 1: 28
Invited Talks, Presentations, and Posters
Hawkey, K., Sun, S.-T., Boshmaf, Y., Jaferian, P., Motiee, S., Raja, F., Beznosov, K. (2011). ISSNet Usable Security Research at UBC, presented at the NSERC Internetwork Systems Security Network (ISSNET) Workshop, Toronto, ON, April 28, 2011
Sun, S.-T, Hawkey, K., and Beznosov, K. (2011). An Investigation of OpenID From Users' Perspective. Poster presented at the NSERC Internetwork Systems Security Network (ISSNET) Workshop, Toronto, ON, April 26, 2011. (P#12).
Jaferian, P., Hawkey, K., and Beznosov, K. (2011). Reasoning in Identify and Access Management. Poster presented at the NSERC Internetwork Systems Security Network (ISSNET) Workshop, Toronto, ON, April 26, 2011. (P#14).
Sotirakopoulos, A., Muslukhov, I., Hawkey, K., Herley, C., Egelman, S., and Beznosov, K. (2011). Motivating Users to Choose Stronger Passwords Through Peer Pressure. Poster presented at the NSERC Internetwork Systems Security Network (ISSNET) Workshop, Toronto, ON, April 26, 2011. (P#16).
Raja, F., Hawkey, K., Hsu, S., Wang, K-L. C., and Beznosov, K.(2011). Promoting a Physical Security Mental Model for Personal Firewall Warnings. Poster presented at the NSERC Internetwork Systems Security Network (ISSNET) Workshop, Toronto, ON, April 26, 2011. (P#17).
Motiee, S., Hawkey, K., and Beznosov, K. (2010). Information Content of a Privilege Elevation Prompt. Poster presented at the NSERC Internetwork Systems Security Network (ISSNET) Workshop, Toronto, ON, April 26, 2011. (P#19).
Beznosov, K., Jaferian, P., Sun, S.-T., Boshmaf, Y., Raja, F., Hawkey, K., Sotirakopoulos, A., Motiee, S. (2010). Overview of ISSNet-related Research at Laboratory for Education and Research in Secure Systems Engineering, presented at the NSERC Internetwork Systems Security Network (ISSNET) Workshop, Ottawa, ON, April 28, 2010
Sun, S.-T, Hawkey, K., and Beznosov, K. (2010). OpenIDemail Enabled Browser. Poster presented at the NSERC Internetwork Systems Security Network (ISSNET) Workshop, Ottawa, ON, April 26, 2010.
Jaferian, P., Hawkey, K., and Beznosov, K. (2010). Towards Developing Usability Heuristics to Evaluate IT Security Management Tools. Poster presented at the NSERC Internetwork Systems Security Network (ISSNET) Workshop, Ottawa, ON, April 26, 2010.
Motiee, S., Hawkey, K., and Beznosov, K. (2010). Investigating User Account Control Practices. Re-presentation of CHI 2010 Work-in-Progress poster. Poster presented at the NSERC Internetwork Systems Security Network (ISSNET) Workshop, Ottawa, ON, April 26, 2010.
Raja, F., Hawkey, K., Beznosov, K., and Booth, K.S. (2010). Investigating an Appropriate Design for Personal Firewalls. Re-presentation of CHI 2010 Work-in-Progress poster. Poster presented at the NSERC Internetwork Systems Security Network (ISSNET) Workshop, Ottawa, ON, April 26, 2010.
Perswain, P., MacKenzie, R., Hawkey, K., Booth, K.S. (2010). Window Management on Large Screens. Poster presented at the UBC Computer Science Undergraduate Research Poster Competition. Vancouver, BC, January 28, 2010.
Raja, F., Hawkey, K., and Beznosov, K. (2009). Revealing Hidden Context: Improving Mental Models of Personal Firewall Users. Talk presented by Fahmeh Raja at Microsoft Research. Redmond, WA, July 13, 2009.
Raja, F., Hawkey, K., and Beznosov, K. (2009). Towards Improving Mental Models of Personal Firewall Users. Poster presented at the NECTAR Annual General Meeting. Calgary, AB, May 28, 2009.
Maksakov, E., Hawkey, K., and Booth, K.S. (2009). Whale Tank Virtual Reality: Collaboration in VR Using a Large Screen. Poster presented at the NECTAR Annual General Meeting. Calgary, AB, May 28, 2009.
MacKenzie, R., Booth, K.S., Hawkey, K., and Staub-French, S. (2009) Projected Fishtank Virtual Reality for Architectural Models. Poster presented at the NECTAR Annual General Meeting. Calgary, AB, May 28, 2009.
MacKenzie, R., Liu, Z., Perswain, P., Hawkey, K., Booth, K.S (2009). Lacome: A LArge COllaborative Meeting Environment. Poster presented at the NECTAR Annual General Meeting. Calgary, AB, May 28, 2009.
Hawkey, K. (2009). Personal Firewalls. Invited Talk. Vancouver Security SIG, Vancouver, British Columbia, March 13, 2009.
Hawkey, K., Botta, D., Werlinger, R., Muldner, K., Gagne, A., and Beznosov, K. (2008). Human, Organizational, and Technological Factors of IT Security. Re-presentation of CHI 2008 Research Landscape Poster. Poster session, SOUPS 2008, Pittsburgh, Pennsylvania, July 23, 2008.
Hawkey, K. (2008). The HOT Admin Project: Human, Organizational, and Technological Factors of IT Security. Invited Talk. Vancouver Security SIG, Vancouver, British Columbia, July 16, 2008.
Hawkey, K. (2008). Usable Privacy and Security: Challenges and Future Research Directions. Invited Talk. Applied Computer Science, The University of Winnipeg, March 24, 2008.
Hawkey, K. (2008). Managing Visual Privacy during Informal Collaboration. Invited Talk. Faculty of Information and Media Studies, University of Western Ontario, February 13, 2008.
Hawkey, K., Muldner, K, and Beznosov, K. (2008). Searching for the Right Fit: Considerations when Balancing IT Security Management Model Tradeoffs. Poster presentation at the 9th Annual Privacy and Security Conference, Victoria, British Columbia, February 2008.
Werlinger, R., Hawkey, K., and Beznosov, K. (2008). Security practitioners in context: Their activities and collaborative interactions. Poster presentation at the 9th Annual Privacy and Security Conference, Victoria, British Columbia, February 2008.
Hawkey, K. (2007). Supporting Informal Collaboration. Invited Talk. Department of Management Sciences, Faculty of Engineering, University of Waterloo, May 9, 2007.
Hawkey, K. (2007). Managing Visual Privacy of Incidental Information within Web Browsers. Invited Talk. 2006-2007 Department Seminar Series, Department of Computer Science, University of Saskatchewan, January 18, 2007.
Hawkey, K. (2006). Managing Visual Privacy of Incidental Information within Web Browsers. Invited Talk. Laboratory for Education and Research in Secure Systems Engineering Group, Electrical and Computer Engineering, University of British Columbia, November 17, 2006.
Hawkey, K. (2006). PrivateBits: Managing Visual Privacy in the Web Browser. Poster and demonstration at the NECTAR AGM.
Banff, AB, November 9, 2006.
Hawkey, K. (2005) Privacy Gradients: Exploring Ways to Manage Incidental Information During Co-located Collaboration. Invited Talk. Interaction Design Reading Group, Commputer Science, University of British Columbia, April 25, 2005.
Hawkey, K. (2003) Design of a Device to Assist with Repetitive Questions in Alzheimer's Patients. Invited Talk. 6th Annual Symposium on the Treatment of Alzheimer's Disease, November 28, 2003.
Hawkey, K. (2002) Invited Participant. Precarn Workshop on Web Intelligence for Functionally Illiterate and Cognitively Impaired Populations. Halifax, Nova Scotia, November 21-23, 2002.
Hawkey, K. (2001) A Human-Centric Layer in Support of Diverse Users and Devices. Doctoral Consortium Poster Session at User Modeling 2001. Germany, June 2001.
Technical Reports
MacKenzie, R., Hawkey, K., Perswain, P., Booth, K.S. (2010) Evaluating Two Window Manipulation Techniques on a Large Screen Display. Tech Report No. UBC CS TR-2010-03. Dept. of Computer Science, University of British Columbia, Vancouver, British Columbia, Canada. (9 pages).
Kaviani, N., Hawkey, K., and Beznosov, K. (2008). Analyzing the Security and Usability of a Two-factor Authentication Mechanism Using Mobile Phones. Tech Report No. LERSSE-TR-2008-03. Laboratory for Education and Research in Secure Systems Engineering, Dept. of Electrical and Computer Engineering, University of British Columbia, Vancouver, British Columbia, Canada. (27 pages).
Hawkey, K. and Inkpen, K. (2004). Privacy Gradients: Understanding Web Browsing Privacy During Ad Hoc Co-Located Collaboration. Tech Report No. CS-2004-18, Faculty of Computer Science, Dalhousie University, Halifax, Canada.
Hawkey, K. and Kellar, M. (2004). Recommendations for reporting context in studies of web browsing behaviour. Tech Report No. CS-2004-16, Faculty of Computer Science, Dalhousie University, Halifax, Canada.
Kellar, M., Inkpen, K.M., Dearman, D., Hawkey, K., Ha, V. MacInnes, J.W., Mackay, B., Nunes, M., Parker, J.K., Reilly, D., Rodgers, M., and Whalen, T. (2004) Evaluation of Mobile Collaboration: Learning from our Mistakes. Tech Report No. CS-2004-13, Faculty of Computer Science, Dalhousie University, Halifax, Canada.
Dearman, D, Hawkey, K. and Inkpen, K.M. (2004). Exploring the Behavioural Effects of Location-Aware Computing While Rendezvousing. Tech Report No. CS-2004-12, Faculty of Computer Science, Dalhousie University, Halifax, Canada.
Dissertation: Managing the visual privacy of incidental information in web browsers (pdf)
Successfully defended: March 29, 2007 (PhD Defence Notification), Convocation: May 23, 2007.
External Examiner: Dr. Alfred Kobsa (University of California, Irvine)
Supervisor: Dr. Kori Inkpen (Dalhousie University)
Committee: Dr. Raza Abidi (Dalhousie University), Dr. Carolyn Watters (Dalhousie University)