Search For:

Displaying 1-10 out of 10 total
This Time, It's Personal: Recent Discussions on Concepts of Personal Information
Found in: IEEE Security and Privacy
By Tara Whalen
Issue Date:January 2012
pp. 77-79
Under privacy regulation, what exactly is personal information? This is an important concept in a changing landscape of technology and information disclosure, in which it's becoming increasingly easier to identify and reidentify individuals. Legal scholars...
Mobile Devices and Location Privacy: Where Do We Go from Here?
Found in: IEEE Security and Privacy
By Tara Whalen
Issue Date:November 2011
pp. 61-62
The eruption of concern over mobile device tracking has led to important public debate over location privacy. These cases demonstrate a lack of transparency in mobile systems, with users in the dark about how companies collect and use their location inform...
Security as if People Mattered
Found in: IEEE Security and Privacy
By Tara Whalen
Issue Date:July 2011
pp. 64-67
Computer security and usability are challenging problems that are often interrelated. In harmonizing security and usability, it isn't enough to consider how human factors can be leveraged in support of security. Instead, it's important to take a user-cente...
Direct Intentions: The Effects of Input Devices on Collaboration around a Tabletop Display
Found in: Horizontal Interactive Human-Computer Systems, International Workshop on
By Vicki Ha, Kori M. Inkpen, Tara Whalen, Regan L. Mandryk
Issue Date:January 2006
pp. 177-184
This paper explores users? interpersonal interactions during collaboration around a tabletop display, in order to better understand the affordances offered by this medium. We investigate participants? collaborative interactions, particularly related to the...
Adaptive Groupware for Wireless Networks
Found in: Mobile Computing Systems and Applications, IEEE Workshop on
By Tara Whalen, James P. Black
Issue Date:February 1999
pp. 20
Current groupware systems do not work well over wireless networks, as a wireless connection is of variable and often poor quality. Our research suggests a number of changes that allow groupware applications to make efficient use of a wireless channel. One ...
Browser interfaces and extended validation SSL certificates: an empirical study
Found in: Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09)
By Andrew S. Patrick, Jennifer Sobey, P. C. van Oorschot, Robert Biddle, Tara Whalen
Issue Date:November 2009
pp. 19-30
There has been a loss of confidence in the security provided by SSL certificates and browser interfaces in the face of various attacks. As one response, basic SSL server certificates are being demoted to second-class status in conjunction with the introduc...
Information displays for managing shared files
Found in: Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology (CHiMiT '08)
By Elaine G. Toms, James Blustein, Tara Whalen
Issue Date:November 2008
pp. 77-81
Within the workplace setting, people need to provide sufficient access to files to allow collaboration, without inadvertently exposing sensitive files. Evidence suggests that file sharing problems exist, and decrease security and interfere with collaborati...
User experiences with sharing and access control
Found in: CHI '06 extended abstracts on Human factors in computing systems (CHI '06)
By Diana Smetters, Elizabeth F. Churchill, Tara Whalen
Issue Date:April 2006
pp. 1517-1522
The sharing of network-based information is a key component of recreational and professional interaction, from email attachments to P2P networks. However, people need to accommodate technical challenges in successful and secure content sharing. In particul...
It's a jungle out there: practical considerations for evaluation in the city
Found in: CHI '05 extended abstracts on Human factors in computing systems (CHI '05)
By Bonnie MacKay, David Dearman, Derek Reilly, Karen Parker, Kirstie Hawkey, Kori M. Inkpen, Malcolm Rodgers, Melanie Kellar, Michael Nunes, Tara Whalen, Vicki Ha, W. Joseph MacInnes
Issue Date:April 2005
pp. 1533-1536
An essential aspect of mobile and ubiquitous computing research is evaluation within the expected usage context, including environment. When that environment is an urban center, it can be dynamic, expansive, and unpredictable. Methodologies that focus on g...
Profiling the defenders
Found in: Proceedings of the 2004 workshop on New security paradigms (NSPW '04)
By Carrie Gates, Tara Whalen
Issue Date:September 2004
pp. 107-114
Psychological research in the security arena has focused on understanding the attacker, with little work done on understanding the defender. This paper presents a pilot study undertaken to determine if there are trends within the defender community, or if ...