关注
Tara Whalen
Tara Whalen
Adjunct Research Professor, Carleton University; Non-Resident Fellow, Stanford Center for Internet and Society
在 connect.carleton.ca 的电子邮件经过验证 - 首页
标题
引用次数
年份
A psychological profile of defender personality traits.
T Whalen, C Gates
J. Comput. 2 (2), 84-93, 2007
202007
Adaptive groupware for wireless networks
T Whalen, JP Black
Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999
111999
Basic Training-Security as if People Mattered
T Whalen
IEEE Security and Privacy 9 (4), 64, 2011
2011
Bridging the gap between privacy by design and privacy in practice
L Stark, J King, X Page, A Lampinen, J Vitak, P Wisniewski, T Whalen, ...
Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors …, 2016
142016
Browser interfaces and extended validation SSL certificates: an empirical study
J Sobey, T Whalen, R Biddle, PV Oorschot, A Patrick
Proceedings of the 2009 ACM workshop on Cloud computing security, 2009
2009
Browser interfaces and extended validation SSL certificates: an empirical study
R Biddle, PC Van Oorschot, AS Patrick, J Sobey, T Whalen
Proceedings of the 2009 ACM workshop on Cloud computing security, 19-30, 2009
1132009
Defender personality traits
T Whalen, C Gates
International Workshop on Intelligence and Security Informatics, 85-90, 2006
2006
Design Issues for an Adaptive Mobile Group Editor
TJ Whalen
University of Waterloo, 1997
51997
Direct intentions: The effects of input devices on collaboration around a tabletop display
V Ha, KM Inkpen, RL Mandryk, T Whalen
First IEEE International Workshop on Horizontal Interactive Human-Computer …, 2006
1252006
Evaluation of mobile collaboration: Learning from our mistakes
M Kellar, K Inkpen, D Dearman, K Hawkey, V Ha, J MacInnes, B MacKay, ...
Technical Report 2004-13, Dalhousie University, 2004
22004
Exploring display factors that influence co-located collaboration: angle, size, number, and user arrangement
K Inkpen, K Hawkey, M Kellar, R Mandryk, K Parker, D Reilly, S Scott, ...
Proc. HCI international 2005, 2005
882005
File sharing and group information management
T Whalen, E Toms, J Blustein
Personal Information Management: PIM 2008, 2008
132008
Gathering evidence: use of visual security cues in web browsers
T Whalen, KM Inkpen
Proceedings of Graphics Interface 2005, 137-144, 2005
2202005
I'm from the Government and I'm Here to Help: Perspectives from a Privacy Tech Wonk
T Whalen
20th USENIX Security Symposium (USENIX Security 11), 2011
2011
Information displays for managing shared files
T Whalen, EG Toms, J Blustein
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for …, 2008
272008
It's a jungle out there: practical considerations for evaluation in the city
M Kellar, D Reilly, K Hawkey, M Rodgers, B MacKay, D Dearman, V Ha, ...
CHI'05 extended abstracts on Human factors in computing systems, 1533-1536, 2005
382005
It's a jungle out there: Practical considerations for evaluation in the city
DF Reilly, D Dearman, MN Nunes, T Whalen
Let The Right One In: Attestation as a Usable {CAPTCHA} Alternative
T Whalen, T Meunier, M Kodali, A Davidson, M Fayed, A Faz-Hernández, ...
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 599-612, 2022
72022
Measuring Online Information Controls: From Theory to Practice
F Bashar, C Anderson, J Crandall, A Filastò, C Doten, B Fabian, ...
5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015
2015
Might I get pwned: A second generation compromised credential checking service
B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ...
31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022
222022
系统目前无法执行此操作,请稍后再试。
文章 1–20