From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Hawkey, Kirstie
add a person with the name Hawkey, Kirstie
 

Другие публикации лиц с тем же именем

Personal Safety App Effectiveness., , , , , , , и . CHI Extended Abstracts, ACM, (2019)Guidelines for designing IT security management tools., , , , и . CHIMIT, стр. 7. ACM, (2008)The challenges of using an intrusion detection system: is it worth the effort?, , , , и . SOUPS, стр. 107-118. ACM, (2008)A multi-method approach for user-centered design of identity management systems., , , и . SOUPS, ACM, (2009)Report from the 5th ACM Symposium on Computer Human Interaction for Management of IT., , и . login Usenix Mag., (2012)Keeping up appearances: understanding the dimensions of incidental information privacy., и . CHI, стр. 821-830. ACM, (2006)MAR: A Study of the Impact of Positive and Negative Reinforcement on Medication Adherence Reminders., , , , и . SeGAH, стр. 1-8. IEEE, (2020)Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0.. CSE (4), стр. 990-995. IEEE Computer Society, (2009)Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs., , и . IEEE Internet Comput., 12 (3): 22-30 (2008)Examining the content and privacy of web browsing incidental information., и . WWW, стр. 123-132. ACM, (2006)