SoK: Safer Digital-Safety Research Involving At-Risk Users R Bellini, E Tseng, N Warford, A Daffalla, T Matthews, S Consolvo, ... arXiv preprint arXiv:2309.00735, 2023 | 5 | 2023 |
{“Millions} of people are watching {you”}: Understanding the {Digital-Safety} Needs and Practices of Creators P Samermit, A Turner, PG Kelley, T Matthews, V Wu, S Consolvo, ... 32nd USENIX Security Symposium (USENIX Security 23), 5629-5645, 2023 | 4 | 2023 |
SoK: A framework for unifying at-risk user research N Warford, T Matthews, K Yang, O Akgul, S Consolvo, PG Kelley, ... 2022 IEEE Symposium on Security and Privacy (SP), 2344-2360, 2022 | 49 | 2022 |
" Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with {US}. political campaigns S Consolvo, PG Kelley, T Matthews, K Thomas, L Dunn, E Bursztein 30th USENIX Security Symposium (USENIX Security 21), 1181-1198, 2021 | 12 | 2021 |
Toward gender-equitable privacy and security in south asia N Sambasivan, N Ahmed, A Batool, E Bursztein, E Churchill, ... IEEE Security & Privacy 17 (4), 71-77, 2019 | 17 | 2019 |
Tough times at transitional homeless shelters: Considering the impact of financial insecurity on digital security and privacy M Sleeper, T Matthews, K O'Leary, A Turner, JP Woelfer, M Shelton, ... Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 19 | 2019 |
" They Don't Leave Us Alone Anywhere We Go" Gender and Digital Abuse in South Asia N Sambasivan, A Batool, N Ahmed, T Matthews, K Thomas, ... proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 137 | 2019 |
łThey Don’t Leave Us Alone Anywhere We Gož: Gender and Digital Abuse in South Asia N Sambasivan, A Batool, N Ahmed, T Matthews, K Thomas, ... | | 2019 |
Dynamic recommendation framework for information technology management EM Haber, TL Matthews, CH Tan, SM Uttamchandani US Patent 10,140,160, 2018 | | 2018 |
" Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia N Sambasivan, G Checkley, A Batool, N Ahmed, D Nemer, ... Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 127-142, 2018 | 177 | 2018 |
Security and privacy experiences and practices of survivors of intimate partner abuse T Matthews, K O’Leary, A Turner, M Sleeper, JP Woelfer, M Shelton, ... IEEE Security & Privacy 15 (5), 76-81, 2017 | 9 | 2017 |
Stories from survivors: Privacy & security practices when coping with intimate partner abuse T Matthews, K O'Leary, A Turner, M Sleeper, JP Woelfer, M Shelton, ... Proceedings of the 2017 CHI conference on human factors in computing systems …, 2017 | 226 | 2017 |
Ranking and recommendation of online content H Badenes, TL Matthews, BA Smith US Patent 9,454,781, 2016 | 14 | 2016 |
" She'll just grab any device that's closer" A Study of Everyday Device & Account Sharing in Households T Matthews, K Liao, A Turner, M Berkovich, R Reeder, S Consolvo Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016 | 138 | 2016 |
Dynamic recommendation framework for information technology management EM Haber, TL Matthews, CH Tan, SM Uttamchandani US Patent 9,323,639, 2016 | | 2016 |
When distance doesn't really matter: effects of geographic dispersion on participation in online enterprise communities J Warshaw, S Whittaker, T Matthews, BA Smith Proceedings of the 19th ACM Conference on Computer-Supported Cooperative …, 2016 | 12 | 2016 |
Evaluating a mobile transcription tool for the deaf T Matthews, S Carter, C Pai, J Fong, J Mankoff Behaviour 4206 (August), 2006, 2015 | 1 | 2015 |
Can an Algorithm Know the" Real You"? Understanding People's Reactions to Hyper-personal Analytics Systems J Warshaw, T Matthews, S Whittaker, C Kau, M Bengualid, BA Smith Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015 | 74 | 2015 |
They said what? Exploring the relationship between language use and member satisfaction in communities T Matthews, JU Mahmud, J Chen, M Muller, E Haber, H Badenes Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015 | 23 | 2015 |
Selecting an effective niche H Zhu, J Chen, T Matthews, A Pal, H Badenes, RE Kraut Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2014 | | 2014 |