Tara Whalen
Tara Whalen
Adjunct Research Professor, Carleton University; Non-Resident Fellow, Stanford Center for Internet and Society
Verified email at connect.carleton.ca - Homepage
Title
Cited by
Cited by
Year
Gathering evidence: use of visual security cues in web browsers
T Whalen, KM Inkpen
Proceedings of Graphics Interface 2005, 137-144, 2005
1762005
Direct intentions: The effects of input devices on collaboration around a tabletop display
V Ha, KM Inkpen, RL Mandryk, T Whalen
First IEEE International Workshop on Horizontal Interactive Human-Computer …, 2006
1122006
The proximity factor: impact of distance on co-located collaboration
K Hawkey, M Kellar, D Reilly, T Whalen, KM Inkpen
Proceedings of the 2005 international ACM SIGGROUP conference on Supporting …, 2005
792005
Exploring display factors that influence co-located collaboration: angle, size, number, and user arrangement
K Inkpen, K Hawkey, M Kellar, R Mandryk, K Parker, D Reilly, S Scott, ...
Proc. HCI international 2005, 2005
752005
Browser interfaces and extended validation SSL certificates: an empirical study
R Biddle, PC Van Oorschot, AS Patrick, J Sobey, T Whalen
Proceedings of the 2009 ACM workshop on Cloud computing security, 19-30, 2009
742009
Playing well with others: Applying board game design to tabletop display interfaces
T Whalen
ACM symposium on user interface software and technology 5, 2003
652003
User experiences with sharing and access control
T Whalen, D Smetters, EF Churchill
CHI'06 extended abstracts on Human factors in computing systems, 1517-1522, 2006
632006
It's a jungle out there: practical considerations for evaluation in the city
M Kellar, D Reilly, K Hawkey, M Rodgers, B MacKay, D Dearman, V Ha, ...
CHI'05 extended abstracts on Human factors in computing systems, 1533-1536, 2005
362005
User study, analysis, and usable security of passwords based on digital objects
R Biddle, M Mannan, PC Van Oorschot, T Whalen
IEEE Transactions on Information Forensics and Security 6 (3), 970-979, 2011
352011
Information displays for managing shared files
T Whalen, EG Toms, J Blustein
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for …, 2008
262008
A psychological profile of defender personality traits
T Whalen, C Gates
Journal of Computers 2 (2), 84-93, 2007
162007
File sharing and group information management
T Whalen, E Toms, J Blustein
Personal Information Management: PIM 2008, 2008
142008
ssmail: Opportunistic Encryption in sendmail.
D Bentley, GG Rose, T Whalen
LISA, 1-8, 1999
121999
Profiling the defenders
C Gates, T Whalen
Proceedings of the 2004 workshop on New security paradigms, 107-114, 2004
112004
Adaptive groupware for wireless networks
T Whalen, JP Black
Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999
111999
Mobile devices and location privacy: Where do we go from here?
T Whalen
IEEE Security & Privacy 9 (6), 61-62, 2011
92011
Network Mapping Tool for Real-Time Security Analysis
F Massicotte, T Whalen, C Bilodeau
Proceeding of NATO/RTO Information Systems Technology Panel Symposium on …, 2002
92002
Bridging the gap between privacy by design and privacy in practice
L Stark, J King, X Page, A Lampinen, J Vitak, P Wisniewski, T Whalen, ...
Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors …, 2016
82016
The usable security of passwords based on digital objects: From design and analysis to user study
M Mannan, T Whalen, R Biddle, PC van Oorschot
School of Computer Science, Carleton University, Tech. Rep. TR-10-02, 2010
82010
Watching the watchers
T Whalen, C Gates
Information Management & Computer Security 18 (1), 14-25, 2010
62010
The system can't perform the operation now. Try again later.
Articles 1–20