Kelly Caine

According to our database1, Kelly Caine authored at least 50 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Auracle: Detecting Eating Episodes with an Ear-mounted Sensor.
IMWUT, 2018

The Case for a Commodity Hardware Solution for Stress Detection.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

Human Perceptions of Sensitive Content in Photos.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings.
PoPETs, 2017

Would You Slack That?: The Impact of Security and Privacy on Cooperative Newsroom Work.
PACMHCI, 2017

Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos.
PACMHCI, 2017

Creative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers.
Proceedings of the 26th USENIX Security Symposium, 2017

Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Poster: Auracle: A Wearable Device for Detecting and Monitoring Eating Behavior.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Wearable Privacy: Skeletons in The Data Closet.
Proceedings of the 2017 IEEE International Conference on Healthcare Informatics, 2017

Investigating contextual cues as indicators for EMA delivery.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

2016
Individual versus Organizational Computer Security and Privacy Concerns in Journalism.
PoPETs, 2016

Privacy Is Healthy.
IEEE Pervasive Computing, 2016

Smart Wearables or Dumb Wearables?: Understanding how Context Impacts the UX in Wrist Worn Interaction.
Proceedings of the 34th ACM International Conference on the Design of Communication, 2016

Sensemaking and Storytelling: Network Security Strategies for Collaborative Groups.
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016

Local Standards for Sample Size at CHI.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Cell phone ownership and use among mental health outpatients in the USA.
Personal and Ubiquitous Computing, 2015

Limited but satisfied: Low SES older adults experiences of aging in place.
Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, 2015

One step forward, two steps back: The key to wearables in the field is the app.
Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, 2015

Design recommendations to improve the user interaction with wrist worn devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

An overview of wearable applications for healthcare: requirements and challenges.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015

Users' Privacy Concerns About Wearables - Impact of Form Factor, Sensors and Type of Data Collected.
Proceedings of the Financial Cryptography and Data Security, 2015

HomeSHARE: A Distributed Smart Homes Testbed Initiative.
Proceedings of the AMIA 2015, 2015

2014
Wearable computing: a human-centered view of key concepts, application domains, and quality factors.
Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services, 2014

Understanding the wearability of head-mounted devices from a human-centered perspective.
Proceedings of the ISWC'14, 2014

Defending against device theft with human notarization.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

From checking on to checking in: designing for low socio-economic status older adults.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Patients want granular privacy control over health information in electronic medical records.
JAMIA, 2013

How In-Home Technologies Mediate Caregiving Relationships in Later Life.
Int. J. Hum. Comput. Interaction, 2013

Security and Privacy in Health IT.
IEEE Security & Privacy, 2013

Understanding the needs of low SES patients with type 2 diabetes.
Proceedings of the 7th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, 2013

Consumer engagement in health technologies special interest group.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Does Profiling Make Us More Secure?
IEEE Security & Privacy, 2012

Opportunities for ubiquitous computing in the homes of low SES older adults.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults.
Proceedings of the International Conference on Human-Robot Interaction, 2012

Reconciling privacy with social media.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, Seattle, WA, USA, February 11-15, 2012, 2012

2011
DigiSwitch: A Device to Allow Older Adults to Monitor and Direct the Collection and Transmission of Health Information Collected at Home.
J. Medical Systems, 2011

Audience visualization influences disclosures in online social networks.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home.
Proceedings of the ACM International Health Informatics Symposium, 2010

Why it works (when it works): success factors in online creative collaboration.
Proceedings of the 2010 International ACM SIGGROUP Conference on Supporting Group Work, 2010

2009
Exploring everyday privacy behaviors and misclosures.
PhD thesis, 2009

Sacred imagery in techno-spiritual design.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Supporting privacy by preventing misclosure.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Predicting successful completion of online collaborative animation projects.
Proceedings of the 7th Conference on Creativity & Cognition, Berkeley, 2009

2008
Sun dial: exploring techno-spiritual design through a mobile islamic call to prayer application.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

Privacy and technology: folk definitions and perspectives.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008


  Loading...