A psychological profile of defender personality traits. T Whalen, C Gates J. Comput. 2 (2), 84-93, 2007 | 20 | 2007 |
Adaptive groupware for wireless networks T Whalen, JP Black Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999 | 11 | 1999 |
Basic Training-Security as if People Mattered T Whalen IEEE Security and Privacy 9 (4), 64, 2011 | | 2011 |
Bridging the gap between privacy by design and privacy in practice L Stark, J King, X Page, A Lampinen, J Vitak, P Wisniewski, T Whalen, ... Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors …, 2016 | 14 | 2016 |
Browser interfaces and extended validation SSL certificates: an empirical study J Sobey, T Whalen, R Biddle, PV Oorschot, A Patrick Proceedings of the 2009 ACM workshop on Cloud computing security, 2009 | | 2009 |
Browser interfaces and extended validation SSL certificates: an empirical study R Biddle, PC Van Oorschot, AS Patrick, J Sobey, T Whalen Proceedings of the 2009 ACM workshop on Cloud computing security, 19-30, 2009 | 113 | 2009 |
Defender personality traits T Whalen, C Gates International Workshop on Intelligence and Security Informatics, 85-90, 2006 | | 2006 |
Design Issues for an Adaptive Mobile Group Editor TJ Whalen University of Waterloo, 1997 | 5 | 1997 |
Direct intentions: The effects of input devices on collaboration around a tabletop display V Ha, KM Inkpen, RL Mandryk, T Whalen First IEEE International Workshop on Horizontal Interactive Human-Computer …, 2006 | 125 | 2006 |
Evaluation of mobile collaboration: Learning from our mistakes M Kellar, K Inkpen, D Dearman, K Hawkey, V Ha, J MacInnes, B MacKay, ... Technical Report 2004-13, Dalhousie University, 2004 | 2 | 2004 |
Exploring display factors that influence co-located collaboration: angle, size, number, and user arrangement K Inkpen, K Hawkey, M Kellar, R Mandryk, K Parker, D Reilly, S Scott, ... Proc. HCI international 2005, 2005 | 88 | 2005 |
File sharing and group information management T Whalen, E Toms, J Blustein Personal Information Management: PIM 2008, 2008 | 13 | 2008 |
Gathering evidence: use of visual security cues in web browsers T Whalen, KM Inkpen Proceedings of Graphics Interface 2005, 137-144, 2005 | 220 | 2005 |
I'm from the Government and I'm Here to Help: Perspectives from a Privacy Tech Wonk T Whalen 20th USENIX Security Symposium (USENIX Security 11), 2011 | | 2011 |
Information displays for managing shared files T Whalen, EG Toms, J Blustein Proceedings of the 2nd ACM Symposium on Computer Human Interaction for …, 2008 | 27 | 2008 |
It's a jungle out there: practical considerations for evaluation in the city M Kellar, D Reilly, K Hawkey, M Rodgers, B MacKay, D Dearman, V Ha, ... CHI'05 extended abstracts on Human factors in computing systems, 1533-1536, 2005 | 38 | 2005 |
It's a jungle out there: Practical considerations for evaluation in the city DF Reilly, D Dearman, MN Nunes, T Whalen | | |
Let The Right One In: Attestation as a Usable {CAPTCHA} Alternative T Whalen, T Meunier, M Kodali, A Davidson, M Fayed, A Faz-Hernández, ... Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 599-612, 2022 | 7 | 2022 |
Measuring Online Information Controls: From Theory to Practice F Bashar, C Anderson, J Crandall, A Filastò, C Doten, B Fabian, ... 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015 | | 2015 |
Might I get pwned: A second generation compromised credential checking service B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ... 31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022 | 22 | 2022 |