Author of the publication

Can an Algorithm Know the "Real You"?: Understanding People's Reactions to Hyper-personal Analytics Systems.

, , , , , and . CHI, page 797-806. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns., , , , , and . USENIX Security Symposium, page 1181-1198. USENIX Association, (2021)How do designers and user experience professionals actually perceive and use personas?, , and . CHI, page 1219-1228. ACM, (2012)Goals and perceived success of online enterprise communities: what is important to leaders & members?, , , , , , and . CHI, page 291-300. ACM, (2014)"Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia., , , , , , , , and . SOUPS @ USENIX Security Symposium, page 127-142. USENIX Association, (2018)Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy., , , , , , , , and . CHI, page 89. ACM, (2019)What Are You Working On? Status Message Q&A in an Enterprise SNS., , , , and . ECSCW, page 313-332. Springer, (2011)Evaluating Peripheral Displays., , and . Awareness Systems, Springer, (2009)A toolkit for managing user attention in peripheral displays., , , , and . UIST, page 247-256. ACM, (2004)Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse., , , , , , , , , and . USENIX Security Symposium, USENIX Association, (2024)SoK: Safer Digital-Safety Research Involving At-Risk Users., , , , , , , , , and 2 other author(s). SP, page 635-654. IEEE, (2024)