Patrick Gage Kelley

Orcid: 0000-0003-4405-0010

Affiliations:
  • Google, USA
  • University of New Mexico, NM, USA
  • Carnegie Mellon University, Pittsburgh, USA


According to our database1, Patrick Gage Kelley authored at least 60 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Advancing Explainability Through AI Literacy and Design Resources.
Interactions, 2023

How Knowledge Workers Think Generative AI Will (Not) Transform Their Industries.
CoRR, 2023

SoK: Safer Digital-Safety Research Involving At-Risk Users.
CoRR, 2023

"Millions of people are watching you": Understanding the Digital-Safety Needs and Practices of Creators.
Proceedings of the 32nd USENIX Security Symposium, 2023

"There will be less privacy, of course": How and why people in 10 countries expect AI will affect privacy in the future.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

"Discover AI in Daily Life": An AI Literacy Lesson for Middle School Students.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023

"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Practicing Information Sensibility: How Gen Z Engages with Online Information.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Understanding Digital-Safety Experiences of Youth in the U.S.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
SoK: A Framework for Unifying At-Risk User Research.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

"It's common and a part of being a content creator": Understanding How Creators Experience and Cope with Hate and Harassment Online.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
"Mixture of amazement at the potential of this technology and concern about possible pitfalls": Public sentiment towards AI in 15 countries.
IEEE Data Eng. Bull., 2021

"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns.
Proceedings of the 30th USENIX Security Symposium, 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Designing Toxic Content Classification for a Diversity of Perspectives.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Exciting, Useful, Worrying, Futuristic: Public Perception of Artificial Intelligence in 8 Countries.
Proceedings of the AIES '21: AAAI/ACM Conference on AI, 2021

2020
"A cold, technical decision-maker": Can AI provide explainability, negotiability, and humanity?
CoRR, 2020

Explainability Case Studies.
CoRR, 2020

"Happy and Assured that life will be easy 10years from now.": Perceptions of Artificial Intelligence in 8 Countries.
CoRR, 2020

Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Protecting accounts from credential stuffing with password breach alerting.
Proceedings of the 28th USENIX Security Symposium, 2019

2017
Balancing Security and Usability in Encrypted Email.
IEEE Internet Comput., 2017

2016
An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

2015
Interactive design and simulation of tubular supporting structure.
Graph. Model., 2015

Fast image segmentation on mobile phone using multi-level graph cut.
Proceedings of the 41st Graphics Interface Conference, Halifax, NS, Canada, June 3-5, 2015, 2015

The Future of Networked Privacy: Challenges and Opportunities.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

I Would Like To..., I Shouldn't..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

2014
Molecular tetris: crowdsourcing molecular docking using path-planning and haptic devices.
Proceedings of the Seventh International Conference on Motion in Games, Playa Vista, CA, USA, November 06, 2014

Immaculacy: a game of privacy.
Proceedings of the first ACM SIGCHI annual symposium on Computer-human interaction in play, Toronto, ON, Canada, October 19, 2014

Curated city: capturing individual city guides through social curation.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Designing Privacy Notices: Supporting User Understanding and Control.
PhD thesis, 2013

The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013

"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Privacy as part of the app decision-making process.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Measuring password guessability for an entire university.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Helping Users Create Better Passwords.
login Usenix Mag., 2012

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012

A Conundrum of Permissions: Installing Applications on an Android Smartphone.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs.
Pers. Ubiquitous Comput., 2011

Measuring and predicting web login safety.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011

An Investigation into Facebook Friend Grouping.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011

Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

Of passwords and people: measuring the effect of password-composition policies.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

When are users comfortable sharing locations with advertisers?
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Encountering stronger password requirements: user attitudes and behaviors.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Empirical models of privacy in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Locaccino: a privacy-centric location sharing application.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Standardizing privacy notices: an online study of the nutrition label approach.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Understanding and capturing people's privacy policies in a mobile social networking application.
Pers. Ubiquitous Comput., 2009

Analyzing use of privacy policy attributes in a location sharing application.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden?
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

A comparative study of online privacy policies and formats.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

A "nutrition label" for privacy.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Who's viewed you?: the impact of feedback in a mobile location-sharing application.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Designing a privacy label: assisting consumer understanding of online privacy practices.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
A user study of the expandable grid applied to P3P privacy policy visualization.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

User-controllable learning of security and privacy policies.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008


  Loading...