Tara Whalen

According to our database1, Tara Whalen authored at least 21 papers between 1999 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Might I Get Pwned: A Second Generation Compromised Credential Checking Service.
Proceedings of the 31st USENIX Security Symposium, 2022

Let The Right One In: Attestation as a Usable CAPTCHA Alternative.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

2016
Bridging the Gap between Privacy by Design and Privacy in Practice.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2012
This Time, It's Personal: Recent Discussions on Concepts of Personal Information.
IEEE Secur. Priv., 2012

2011
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects.
IEEE Trans. Inf. Forensics Secur., 2011

Mobile Devices and Location Privacy: Where Do We Go from Here?
IEEE Secur. Priv., 2011

Security as if People Mattered.
IEEE Secur. Priv., 2011

2010
Watching the watchers: "voluntary monitoring" of infosec employees.
Inf. Manag. Comput. Secur., 2010

2009
Watchdog or Guardian? Unpacking the Issues Surrounding the Monitoring of InfoSec Employees.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009

Browser interfaces and extended validation SSL certificates: an empirical study.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Information displays for managing shared files.
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2008

2007
A Psychological Profile of Defender Personality Traits.
J. Comput., 2007

2006
Defender Personality Traits.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

Direct Intentions: The Effects of Input Devices on Collaboration around a Tabletop Display.
Proceedings of the First IEEE International Workshop on Horizontal Interactive Human-Computer Systems (Tabletop 2006), 2006

User experiences with sharing and access control.
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2005
The proximity factor: impact of distance on co-located collaboration.
Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, 2005

Gathering evidence: use of visual security cues in web browsers.
Proceedings of the Graphics Interface 2005 Conference, 2005

It's a jungle out there: practical considerations for evaluation in the city.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

2004
Profiling the defenders.
Proceedings of the New Security Paradigms Workshop 2004, 2004

1999
Adaptive Groupware for Wireless Networks.
Proceedings of the 2nd Workshop on Mobile Computing Systems and Applications (WMCSA '99), 1999

ssmail: Opportunistic Encryption in sendmail.
Proceedings of the 13th Conference on Systems Administration (LISA-99), 1999


  Loading...