Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks

Nishant Vishwamitra , Yifang Li , Kevin Wang , Hongxin Hu
symposium on access control models and technologies 155 -166

19
2017
Wearable Privacy: Skeletons in The Data Closet

Byron Lowens , Vivian Genaro Motti , Kelly Caine
ieee international conference on healthcare informatics 295 -304

12
2017
Consumer engagement in health technologies special interest group

Karen Cheng , Kelly Caine , Wanda Pratt , Kay Connelly
human factors in computing systems 2485 -2488

2013
An overview of wearable applications for healthcare: requirements and challenges

Vivian Genaro Motti , Kelly Caine
international symposium on wearable computers 635 -641

32
2015
Sensemaking and Storytelling: Network Security Strategies for Collaborative Groups

Elizabeth Anne Watkins , Franziska Roesner , Susan McGregor , Byron Lowens
collaboration technologies and systems 622 -623

2
2016
Investigating contextual cues as indicators for EMA delivery

Varun Mishra , Byron Lowens , Sarah Lord , Kelly Caine
international symposium on wearable computers 2017 935 -940

7
2017
Can Computer-Generated Speech Have an Age?

Earl W. Huff , Brodrick Stigall , Julian Brinkley , Richard Pak
human factors in computing systems 1 -7

1
2020
Designing Consumer Health Technologies for the Treatment of Patients With Depression: A Health Practitioner's Perspective.

Ginger White , Kelly Caine , Kay Connelly , Rebecca Selove
The Journal of medical research 3 ( 1)

5
2014
Individual versus Organizational Computer Security and Privacy Concerns in Journalism

Susan E. McGregor , Franziska Roesner , Kelly Caine
privacy enhancing technologies 2016 ( 4) 418 -435

37
2016
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps’ Privacy Permission Settings

Qatrunnada Ismail , Tousif Ahmed , Kelly Caine , Apu Kapadia
privacy enhancing technologies 2017 ( 4) 119 -137

5
2017
The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults

Kelly Caine , Selma Šabanovic , Mary Carter
Proceedings of the seventh annual ACM/IEEE international conference on Human-Robot Interaction - HRI '12 343 -350

116
2012
Wearable computing: a human-centered view of key concepts, application domains, and quality factors

Vivian Genaro Motti , Spencer Kohn , Kelly Caine
human computer interaction with mobile devices and services 563 -564

5
2014
Understanding the wearability of head-mounted devices from a human-centered perspective

Vivian Genaro Motti , Kelly Caine
international symposium on wearable computers 83 -86

23
2014
Continuous Detection of Physiological Stress with Commodity Hardware

Varun Mishra , Gunnar Pope , Sarah Lord , Stephanie Lewia
ACM Transactions on Computing for Healthcare 1 ( 2) 1 -30

8
2020
Why Johnny Can't Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems

Greg Norcie , Jim Blythe , Kelly Caine , L. Jean Camp
Proceedings 2014 Workshop on Usable Security

15
2014
Why it works (when it works): success factors in online creative collaboration

Kurt Luther , Kelly Caine , Kevin Ziegler , Amy Bruckman
international conference on supporting group work 1 -10

71
2010
Privacy and technology: folk definitions and perspectives

Michelle Kwasny , Kelly Caine , Wendy A. Rogers , Arthur D. Fisk
human factors in computing systems 2008 3291 -3296

32
2008
From checking on to checking in: designing for low socio-economic status older adults

Ingrid Arreola , Zan Morris , Matthew Francisco , Kay Connelly
human factors in computing systems 1933 -1936

22
2014
Design recommendations to improve the user interaction with wrist worn devices

Byron Lowens , Vivian Motti , Kelly Caine
international conference on pervasive computing 562 -567

9
2015
Defending against device theft with human notarization

Alana Libonati , Kelly Caine , Apu Kapadia , Michael Reiter
collaborative computing 8 -17

2014