Kelly Caine

Orcid: 0000-0003-3025-4194

Affiliations:
  • Clemson University, SC, USA


According to our database1, Kelly Caine authored at least 66 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EPIC: Enhanced Privacy and Integrity Considerations for Research (Tutorial).
Proceedings of the Companion Proceedings of the 29th International Conference on Intelligent User Interfaces, 2024

2023
Transparency, Trust, and Security Needs for the Design of Digital News Authentication Tools.
Proc. ACM Hum. Comput. Interact., April, 2023

How do I compare to the other people?": Older Adults' Perspectives on Personal Smart Home Data for Self-Management".
Proc. ACM Hum. Comput. Interact., 2023

On Chatbots for Visual Exploratory Data Analysis.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Usable Cryptographic Provenance: A Proactive Complement to Fact-Checking for Mitigating Misinformation.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022

Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Obfuscation Remedies Harms Arising from Content Flagging of Photos.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Anonymity, User Engagement, Quality, and Trolling on Q&A Sites.
Proc. ACM Hum. Comput. Interact., 2021

Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication.
Proceedings of the 30th USENIX Security Symposium, 2021

Swipe a Screen or Say the Word: Older Adults' Preferences for Information-seeking with Touchscreen and Voice-User Interfaces.
Proceedings of the OzCHI '21: 33rd Australian Conference on Human-Computer Interaction, Melbourne, VI, Australia, 30 November 2021, 2021

2020
Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology.
Proc. Priv. Enhancing Technol., 2020

Continuous Detection of Physiological Stress with Commodity Hardware.
ACM Trans. Comput. Heal., 2020

Towards A Taxonomy of Content Sensitivity and Sharing Preferences for Photos.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Can Computer-Generated Speech Have an Age?
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

2019
Older Adults' Perception and Use of Voice User Interfaces: A Preliminary Review of the Computing Literature.
Proceedings of the OZCHI'19: 31st Australian Conference on Human-Computer-Interaction, 2019

Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

HomeSHARE: Implementing Multi-Site Smart Technology Infrastructure.
Proceedings of the AMIA 2019, 2019

2018
Auracle: Detecting Eating Episodes with an Ear-mounted Sensor.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

The Case for a Commodity Hardware Solution for Stress Detection.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

Human Perceptions of Sensitive Content in Photos.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings.
Proc. Priv. Enhancing Technol., 2017

Would You Slack That?: The Impact of Security and Privacy on Cooperative Newsroom Work.
Proc. ACM Hum. Comput. Interact., 2017

Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos.
Proc. ACM Hum. Comput. Interact., 2017

Creative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers.
Proceedings of the 26th USENIX Security Symposium, 2017

Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Poster: Auracle: A Wearable Device for Detecting and Monitoring Eating Behavior.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Wearable Privacy: Skeletons in The Data Closet.
Proceedings of the 2017 IEEE International Conference on Healthcare Informatics, 2017

Investigating contextual cues as indicators for EMA delivery.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

2016
Individual versus Organizational Computer Security and Privacy Concerns in Journalism.
Proc. Priv. Enhancing Technol., 2016

Privacy Is Healthy.
IEEE Pervasive Comput., 2016

Smart Wearables or Dumb Wearables?: Understanding how Context Impacts the UX in Wrist Worn Interaction.
Proceedings of the 34th ACM International Conference on the Design of Communication, 2016

Sensemaking and Storytelling: Network Security Strategies for Collaborative Groups.
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016

Local Standards for Sample Size at CHI.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Cell phone ownership and use among mental health outpatients in the USA.
Pers. Ubiquitous Comput., 2015

Limited but satisfied: Low SES older adults experiences of aging in place.
Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, 2015

One step forward, two steps back: The key to wearables in the field is the app.
Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, 2015

Design recommendations to improve the user interaction with wrist worn devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

An overview of wearable applications for healthcare: requirements and challenges.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015

Users' Privacy Concerns About Wearables - Impact of Form Factor, Sensors and Type of Data Collected.
Proceedings of the Financial Cryptography and Data Security, 2015

HomeSHARE: A Distributed Smart Homes Testbed Initiative.
Proceedings of the AMIA 2015, 2015

2014
Wearable computing: a human-centered view of key concepts, application domains, and quality factors.
Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services, 2014

Understanding the wearability of head-mounted devices from a human-centered perspective.
Proceedings of the ISWC'14, 2014

Defending against device theft with human notarization.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

From checking on to checking in: designing for low socio-economic status older adults.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Patients want granular privacy control over health information in electronic medical records.
J. Am. Medical Informatics Assoc., 2013

How In-Home Technologies Mediate Caregiving Relationships in Later Life.
Int. J. Hum. Comput. Interact., 2013

Security and Privacy in Health IT.
IEEE Secur. Priv., 2013

Understanding the needs of low SES patients with type 2 diabetes.
Proceedings of the 7th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, 2013

Consumer engagement in health technologies special interest group.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Does Profiling Make Us More Secure?
IEEE Secur. Priv., 2012

Opportunities for ubiquitous computing in the homes of low SES older adults.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults.
Proceedings of the International Conference on Human-Robot Interaction, 2012

Reconciling privacy with social media.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, Seattle, WA, USA, February 11-15, 2012, 2012

2011
DigiSwitch: A Device to Allow Older Adults to Monitor and Direct the Collection and Transmission of Health Information Collected at Home.
J. Medical Syst., 2011

Audience visualization influences disclosures in online social networks.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home.
Proceedings of the ACM International Health Informatics Symposium, 2010

Why it works (when it works): success factors in online creative collaboration.
Proceedings of the 2010 International ACM SIGGROUP Conference on Supporting Group Work, 2010

2009
Exploring everyday privacy behaviors and misclosures.
PhD thesis, 2009

Sacred imagery in techno-spiritual design.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Supporting privacy by preventing misclosure.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Predicting successful completion of online collaborative animation projects.
Proceedings of the 7th Conference on Creativity & Cognition, Berkeley, 2009

2008
Sun dial: exploring techno-spiritual design through a mobile islamic call to prayer application.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

Privacy and technology: folk definitions and perspectives.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008


  Loading...