Tara Whalen
Tara Whalen
Adjunct Research Professor, Carleton University; Non-Resident Fellow, Stanford Center for Internet and Society
Verified email at - Homepage
Cited by
Cited by
Gathering evidence: use of visual security cues in web browsers
T Whalen, KM Inkpen
Proceedings of Graphics Interface 2005, 137-144, 2005
Direct intentions: The effects of input devices on collaboration around a tabletop display
V Ha, KM Inkpen, RL Mandryk, T Whalen
First IEEE International Workshop on Horizontal Interactive Human-Computer …, 2006
Browser interfaces and extended validation SSL certificates: an empirical study
R Biddle, PC Van Oorschot, AS Patrick, J Sobey, T Whalen
Proceedings of the 2009 ACM workshop on Cloud computing security, 19-30, 2009
The proximity factor: impact of distance on co-located collaboration
K Hawkey, M Kellar, D Reilly, T Whalen, KM Inkpen
Proceedings of the 2005 ACM International Conference on Supporting Group …, 2005
Exploring display factors that influence co-located collaboration: angle, size, number, and user arrangement
K Inkpen, K Hawkey, M Kellar, R Mandryk, K Parker, D Reilly, S Scott, ...
Proc. HCI international 2005, 2005
User experiences with sharing and access control
T Whalen, D Smetters, EF Churchill
CHI'06 extended abstracts on Human factors in computing systems, 1517-1522, 2006
Playing well with others: Applying board game design to tabletop display interfaces
T Whalen
ACM symposium on user interface software and technology 5, 2003
User study, analysis, and usable security of passwords based on digital objects
R Biddle, M Mannan, PC van Oorschot, T Whalen
IEEE Transactions on Information Forensics and Security 6 (3), 970-979, 2011
It's a jungle out there: practical considerations for evaluation in the city
M Kellar, D Reilly, K Hawkey, M Rodgers, B MacKay, D Dearman, V Ha, ...
CHI'05 extended abstracts on Human factors in computing systems, 1533-1536, 2005
Information displays for managing shared files
T Whalen, EG Toms, J Blustein
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for …, 2008
A Psychological Profile of Defender Personality Traits.
T Whalen, C Gates
J. Comput. 2 (2), 84-93, 2007
Might I get pwned: A second generation compromised credential checking service
B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ...
31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022
File sharing and group information management
T Whalen, E Toms, J Blustein
Personal Information Management: PIM 2008, 2008
Bridging the gap between privacy by design and privacy in practice
L Stark, J King, X Page, A Lampinen, J Vitak, P Wisniewski, T Whalen, ...
Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors …, 2016
Profiling the defenders
C Gates, T Whalen
Proceedings of the 2004 workshop on New security paradigms, 107-114, 2004
Adaptive groupware for wireless networks
T Whalen, JP Black
Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999
The usable security of passwords based on digital objects: From design and analysis to user study
M Mannan, T Whalen, R Biddle, PC Van Oorschot
School of Computer Science, Carleton University, Tech. Rep. TR-10-02, 2010
Network Mapping Tool for Real-Time Security Analysis
F Massicotte, T Whalen, C Bilodeau
Proceeding of NATO/RTO Information Systems Technology Panel Symposium on …, 2002
ssmail: Opportunistic Encryption in sendmail.
D Bentley, GG Rose, T Whalen
LISA, 1-8, 1999
Mobile devices and location privacy: Where do we go from here?
T Whalen
IEEE Security & Privacy 9 (6), 61-62, 2011
The system can't perform the operation now. Try again later.
Articles 1–20