Emilee Rader

Orcid: 0000-0003-2459-2744

Affiliations:
  • University of Wisconsin-Madison, WI, USA
  • Michigan State University, Department of Media and Information (former)
  • Northwestern University, Department of Communication Studies (former)


According to our database1, Emilee Rader authored at least 35 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Data Privacy and Pluralistic Ignorance.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

2022
Normative and Non-Social Beliefs about Sensor Data: Implications for Collective Privacy Management.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Replication: Stories as Informal Lessons about Security.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

2021
Prioritizing security over usability: Strategies for how people choose passwords.
J. Cybersecur., 2021

Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

2020
It's the Wild, Wild West: Lessons Learned From IRB Members' Risk Perceptions Toward Digital Research Data.
Proc. ACM Hum. Comput. Interact., 2020

The Role of Conversational Grounding in Supporting Symbiosis Between People and Digital Assistants.
Proc. ACM Hum. Comput. Interact., 2020

"I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences and Self-Perceptions.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Towards a Conceptual Model for Provoking Privacy Speculation.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

'That's Not Me': Surprising Algorithmic Inferences.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted Email.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
"Wait, Do I Know This Person?": Understanding Misdirected Email.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Explanations as Mechanisms for Supporting Algorithmic Transparency.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Examining user surprise as a symptom of algorithmic filtering.
Int. J. Hum. Comput. Stud., 2017

The importance of visibility for folk theories of sensor data.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Can People Self-Report Security Accurately?: Agreement Between Self-Report and Behavioral Measures.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Explaining the News Feed Algorithm: An Analysis of the.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

2015
Identifying patterns in informal sources of security information.
J. Cybersecur., 2015

Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Understanding User Beliefs About Algorithmic Curation in the Facebook News Feed.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and Google.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Betrayed by updates: how negative experiences affect future security.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2012
Stories as informal lessons about security.
Proceedings of the Symposium On Usable Privacy and Security, 2012

The gap between producer intentions and consumer behavior in social media.
Proceedings of the ACM 2012 International Conference on Support Group Work, 2012

2011
Influencing mental models of security: a research agenda.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Brick by brick: iterating interventions to bridge the achievement gap with virtual peers.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
The effect of audience design on labeling, organizing, and finding shared files.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Yours, mine and (not) ours: social influences on group information repositories.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
Influences on tag choices in del.icio.us.
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, 2008

2007
Just Email It to Me! Why Things Get Lost in Shared File Repositories.
Proceedings of the Human-Computer Interaction, 2007

Testing the technology: playing games with video conferencing.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

Public bookmarks and private benefits: An analysis of incentives in social computing.
Proceedings of the Joining Research and Practice: Social Computing and Information Science, 2007

2000
Using a large projection screen as an alternative to head-mounted displays for virtual environments.
Proceedings of the CHI 2000 Conference on Human factors in computing systems, 2000


  Loading...