Follow
Tara Whalen
Tara Whalen
Adjunct Research Professor, Carleton University; Non-Resident Fellow, Stanford Center for Internet and Society
Verified email at connect.carleton.ca - Homepage
Title
Cited by
Cited by
Year
Gathering evidence: use of visual security cues in web browsers
T Whalen, KM Inkpen
Proceedings of Graphics Interface 2005, 137-144, 2005
2152005
Direct intentions: The effects of input devices on collaboration around a tabletop display
V Ha, KM Inkpen, RL Mandryk, T Whalen
First IEEE International Workshop on Horizontal Interactive Human-Computer …, 2006
1232006
Browser interfaces and extended validation SSL certificates: an empirical study
R Biddle, PC Van Oorschot, AS Patrick, J Sobey, T Whalen
Proceedings of the 2009 ACM workshop on Cloud computing security, 19-30, 2009
1112009
The proximity factor: impact of distance on co-located collaboration
K Hawkey, M Kellar, D Reilly, T Whalen, KM Inkpen
Proceedings of the 2005 ACM International Conference on Supporting Group …, 2005
972005
Exploring display factors that influence co-located collaboration: angle, size, number, and user arrangement
K Inkpen, K Hawkey, M Kellar, R Mandryk, K Parker, D Reilly, S Scott, ...
Proc. HCI international 2005, 2005
882005
User experiences with sharing and access control
T Whalen, D Smetters, EF Churchill
CHI'06 extended abstracts on Human factors in computing systems, 1517-1522, 2006
722006
Playing well with others: Applying board game design to tabletop display interfaces
T Whalen
ACM symposium on user interface software and technology 5, 2003
692003
User study, analysis, and usable security of passwords based on digital objects
R Biddle, M Mannan, PC van Oorschot, T Whalen
IEEE Transactions on Information Forensics and Security 6 (3), 970-979, 2011
492011
It's a jungle out there: practical considerations for evaluation in the city
M Kellar, D Reilly, K Hawkey, M Rodgers, B MacKay, D Dearman, V Ha, ...
CHI'05 extended abstracts on Human factors in computing systems, 1533-1536, 2005
382005
Information displays for managing shared files
T Whalen, EG Toms, J Blustein
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for …, 2008
282008
A Psychological Profile of Defender Personality Traits.
T Whalen, C Gates
J. Comput. 2 (2), 84-93, 2007
202007
Might I get pwned: A second generation compromised credential checking service
B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ...
31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022
152022
File sharing and group information management
T Whalen, E Toms, J Blustein
Personal Information Management: PIM 2008, 2008
132008
Bridging the gap between privacy by design and privacy in practice
L Stark, J King, X Page, A Lampinen, J Vitak, P Wisniewski, T Whalen, ...
Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors …, 2016
122016
Profiling the defenders
C Gates, T Whalen
Proceedings of the 2004 workshop on New security paradigms, 107-114, 2004
122004
Adaptive groupware for wireless networks
T Whalen, JP Black
Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999
111999
The usable security of passwords based on digital objects: From design and analysis to user study
M Mannan, T Whalen, R Biddle, PC Van Oorschot
School of Computer Science, Carleton University, Tech. Rep. TR-10-02, 2010
102010
Network Mapping Tool for Real-Time Security Analysis
F Massicotte, T Whalen, C Bilodeau
Proceeding of NATO/RTO Information Systems Technology Panel Symposium on …, 2002
102002
ssmail: Opportunistic Encryption in sendmail.
D Bentley, GG Rose, T Whalen
LISA, 1-8, 1999
101999
Mobile devices and location privacy: Where do we go from here?
T Whalen
IEEE Security & Privacy 9 (6), 61-62, 2011
92011
The system can't perform the operation now. Try again later.
Articles 1–20