default search action
Kelly Caine
Person information
- affiliation: Clemson University, SC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c50]Sushmita Khan, Mehtab Iqbal, Oluwafemi Osho, Khushbu Singh, Kyra Derrick, Philip Nelson, Lingyuan Li, Emily Sidnam-Mauch, Nicole Bannister, Kelly Caine, Bart P. Knijnenburg:
Teaching Middle Schoolers about the Privacy Threats of Tracking and Pervasive Personalization: A Classroom Intervention Using Design-Based Research. CHI 2024: 679:1-679:26 - [c49]Errol Francis II, Catherine Barwulor, Ayana R. Monroe, Kediel O. Morales, Samya Potlapalli, Kimberly Brown, Julia Jose, Emily Sidnam-Mauch, Susan E. McGregor, Kelly Caine:
Usable News Authentication: How the Presentation and Location of Cryptographic Information Impacts the Usability of Provenance Information and Perceptions of News Articles. CHI 2024: 830:1-830:20 - [c48]Hanna AlZughbi, Kelly Caine, Mehtab Iqbal, Bart P. Knijnenburg, Hansen Lee, Susan E. McGregor, Emily Sidnam-Mauch:
EPIC: Enhanced Privacy and Integrity Considerations for Research (Tutorial). IUI Companion 2024: 166-168 - 2023
- [j17]Errol Francis II, Ayana Monroe, Emily Sidnam-Mauch, Bernat Ivancsics, Eve Washington, Susan E. McGregor, Joseph Bonneau, Kelly Caine:
Transparency, Trust, and Security Needs for the Design of Digital News Authentication Tools. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-44 (2023) - [j16]Clara Marques Caldeira, Novia Nurain, Anna A. Heintzman, Haley Molchan, Kelly Caine, George Demiris, Katie A. Siek, Blaine Reeder, Kay Connelly:
How do I compare to the other people?": Older Adults' Perspectives on Personal Smart Home Data for Self-Management". Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-32 (2023) - [c47]Brodrick Stigall, Ryan A. Rossi, Jane Hoffswell, Xiang Chen, Shunan Guo, Fan Du, Eunyee Koh, Kelly Caine:
On Chatbots for Visual Exploratory Data Analysis. IEEE Big Data 2023: 5924-5929 - 2022
- [c46]Yifang Li, Kelly Caine:
Obfuscation Remedies Harms Arising from Content Flagging of Photos. CHI 2022: 35:1-35:25 - [c45]Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao, Gail-Joon Ahn:
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks. CODASPY 2022: 65-76 - [c44]Emily Sidnam-Mauch, Bernat Ivancsics, Ayana Monroe, Eve Washington, Errol Francis II, Kelly Caine, Joseph Bonneau, Susan E. McGregor:
Usable Cryptographic Provenance: A Proactive Complement to Fact-Checking for Mitigating Misinformation. ICWSM Workshops 2022 - 2021
- [j15]Cheng Guo, Kelly Caine:
Anonymity, User Engagement, Quality, and Trolling on Q&A Sites. Proc. ACM Hum. Comput. Interact. 5(CSCW1): 141:1-141:27 (2021) - [c43]Simon Coghlan, Jenny Waycott, Lei Nui, Kelly Caine, Brodrick Stigall:
Swipe a Screen or Say the Word: Older Adults' Preferences for Information-seeking with Touchscreen and Voice-User Interfaces. OZCHI 2021: 130-143 - [c42]Cheng Guo, Brianne Campbell, Apu Kapadia, Michael K. Reiter, Kelly Caine:
Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication. USENIX Security Symposium 2021: 1-18 - 2020
- [j14]Varun Mishra, Gunnar Pope, Sarah E. Lord, Stephanie Lewia, Byron Lowens, Kelly Caine, Sougata Sen, Ryan J. Halter, David Kotz:
Continuous Detection of Physiological Stress with Commodity Hardware. ACM Trans. Comput. Heal. 1(2): 8:1-8:30 (2020) - [j13]Moses Namara, Daricia Wilkinson, Kelly Caine, Bart P. Knijnenburg:
Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology. Proc. Priv. Enhancing Technol. 2020(1): 83-102 (2020) - [c41]Earl W. Huff Jr., Brodrick Stigall, Julian Brinkley, Richard Pak, Kelly Caine:
Can Computer-Generated Speech Have an Age? CHI Extended Abstracts 2020: 1-7 - [c40]Yifang Li, Nishant Vishwamitra, Hongxin Hu, Kelly Caine:
Towards A Taxonomy of Content Sensitivity and Sharing Preferences for Photos. CHI 2020: 1-14
2010 – 2019
- 2019
- [c39]Blaine Reeder, Haley Molchan, Eric Gutierrez, Ewelina Pena, Kelly Caine, George Demiris, Katie A. Siek, Kay Connelly:
HomeSHARE: Implementing Multi-Site Smart Technology Infrastructure. AMIA 2019 - [c38]Rakibul Hasan, Yifang Li, Eman T. Hassan, Kelly Caine, David J. Crandall, Roberto Hoyle, Apu Kapadia:
Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms. CHI 2019: 367 - [c37]Brodrick Stigall, Jenny Waycott, Steven Baker, Kelly Caine:
Older Adults' Perception and Use of Voice User Interfaces: A Preliminary Review of the Computing Literature. OZCHI 2019: 423-427 - 2018
- [j12]Shengjie Bi, Tao Wang, Nicole Tobias, Josephine Nordrum, Shang Wang, George Halvorsen, Sougata Sen, Ronald A. Peterson, Kofi Odame, Kelly Caine, Ryan J. Halter, Jacob Sorber, David Kotz:
Auracle: Detecting Eating Episodes with an Ear-mounted Sensor. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(3): 92:1-92:27 (2018) - [c36]Rakibul Hasan, Eman T. Hassan, Yifang Li, Kelly Caine, David J. Crandall, Roberto Hoyle, Apu Kapadia:
Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy. CHI 2018: 47 - [c35]Yifang Li, Wyatt Troutman, Bart P. Knijnenburg, Kelly Caine:
Human Perceptions of Sensitive Content in Photos. CVPR Workshops 2018: 1590-1596 - [c34]Varun Mishra, Gunnar Pope, Sarah E. Lord, Stephanie Lewia, Byron Lowens, Kelly Caine, Sougata Sen, Ryan J. Halter, David Kotz:
The Case for a Commodity Hardware Solution for Stress Detection. UbiComp/ISWC Adjunct 2018: 1717-1728 - 2017
- [j11]Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, Kelly Caine:
Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos. Proc. ACM Hum. Comput. Interact. 1(CSCW): 67:1-67:24 (2017) - [j10]Susan E. McGregor, Elizabeth Anne Watkins, Kelly Caine:
Would You Slack That?: The Impact of Security and Privacy on Cooperative Newsroom Work. Proc. ACM Hum. Comput. Interact. 1(CSCW): 75:1-75:22 (2017) - [j9]Qatrunnada Ismail, Tousif Ahmed, Kelly Caine, Apu Kapadia, Michael K. Reiter:
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings. Proc. Priv. Enhancing Technol. 2017(4): 119-137 (2017) - [c33]Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, Kelly Caine:
Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images. CVPR Workshops 2017: 1343-1351 - [c32]Varun Mishra, Byron Lowens, Sarah E. Lord, Kelly Caine, David Kotz:
Investigating contextual cues as indicators for EMA delivery. UbiComp/ISWC Adjunct 2017: 935-940 - [c31]Byron Lowens, Vivian Genaro Motti, Kelly Caine:
Wearable Privacy: Skeletons in The Data Closet. ICHI 2017: 295-304 - [c30]Shengjie Bi, Ellen Davenport, Jun Gong, Ronald A. Peterson, Joseph Skinner, Kevin M. Storer, Tao Wang, Kelly Caine, Ryan J. Halter, David Kotz, Kofi Odame, Jacob Sorber, Xing-Dong Yang:
Poster: Auracle: A Wearable Device for Detecting and Monitoring Eating Behavior. MobiSys 2017: 176 - [c29]Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine, Gail-Joon Ahn:
Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks. SACMAT 2017: 155-166 - [c28]Susan E. McGregor, Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Kelly Caine, Franziska Roesner:
When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers. USENIX Security Symposium 2017: 505-522 - [c27]Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Franziska Roesner, Kelly Caine, Susan E. McGregor:
Creative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms. FOCI @ USENIX Security Symposium 2017 - 2016
- [j8]Kelly E. Caine:
Privacy Is Healthy. IEEE Pervasive Comput. 15(4): 14-19 (2016) - [j7]Susan E. McGregor, Franziska Roesner, Kelly Caine:
Individual versus Organizational Computer Security and Privacy Concerns in Journalism. Proc. Priv. Enhancing Technol. 2016(4): 418-435 (2016) - [c26]Kelly Caine:
Local Standards for Sample Size at CHI. CHI 2016: 981-992 - [c25]Elizabeth Anne Watkins, Franziska Roesner, Susan E. McGregor, Byron Lowens, Kelly Caine, Mahdi Nasrullah Al-Ameen:
Sensemaking and Storytelling: Network Security Strategies for Collaborative Groups. CTS 2016: 622-623 - [c24]Vivian Genaro Motti, Kelly Caine:
Smart Wearables or Dumb Wearables?: Understanding how Context Impacts the UX in Wrist Worn Interaction. SIGDOC 2016: 10 - 2015
- [j6]Brianne Campbell, Kelly E. Caine, Kay Connelly, Thomas Doub, April Bragg:
Cell phone ownership and use among mental health outpatients in the USA. Pers. Ubiquitous Comput. 19(2): 367-378 (2015) - [c23]Kay Connelly, Blaine Reeder, Amanda K. Hall, Kelly E. Caine, Katie A. Siek, George Demiris:
HomeSHARE: A Distributed Smart Homes Testbed Initiative. AMIA 2015 - [c22]Vivian Genaro Motti, Kelly Caine:
Users' Privacy Concerns About Wearables - Impact of Form Factor, Sensors and Type of Data Collected. Financial Cryptography Workshops 2015: 231-244 - [c21]Vivian Genaro Motti, Kelly Caine:
An overview of wearable applications for healthcare: requirements and challenges. UbiComp/ISWC Adjunct 2015: 635-641 - [c20]Byron Lowens, Vivian Genaro Motti, Kelly Caine:
Design recommendations to improve the user interaction with wrist worn devices. PerCom Workshops 2015: 562-567 - [c19]Ginger E. White, Tanya Singh, Kelly Caine, Kay Connelly:
Limited but satisfied: Low SES older adults experiences of aging in place. PervasiveHealth 2015: 121-128 - [c18]Bliss M. Altenhoff, Haley Vaigneur, Kelly Caine:
One step forward, two steps back: The key to wearables in the field is the app. PervasiveHealth 2015: 241-244 - 2014
- [c17]Ingrid Arreola, Zan Morris, Matthew Francisco, Kay Connelly, Kelly E. Caine, Ginger E. White:
From checking on to checking in: designing for low socio-economic status older adults. CHI 2014: 1933-1936 - [c16]Alana Libonati, Kelly Caine, Apu Kapadia, Michael K. Reiter:
Defending against device theft with human notarization. CollaborateCom 2014: 8-17 - [c15]Vivian Genaro Motti, Kelly Caine:
Understanding the wearability of head-mounted devices from a human-centered perspective. ISWC 2014: 83-86 - [c14]Vivian Genaro Motti, Spencer Kohn, Kelly Caine:
Wearable computing: a human-centered view of key concepts, application domains, and quality factors. Mobile HCI 2014: 563-564 - 2013
- [j5]Kelly Caine, Michael Lesk:
Security and Privacy in Health IT. IEEE Secur. Priv. 11(6): 10-11 (2013) - [j4]Lesa Lorenzen-Huber, Kalpana Shankar, Kelly E. Caine, Kay Connelly, L. Jean Camp, Beth Ann Walker, Lisa Borrero:
How In-Home Technologies Mediate Caregiving Relationships in Later Life. Int. J. Hum. Comput. Interact. 29(7): 441-455 (2013) - [j3]Kelly Caine, Rima Hanania:
Patients want granular privacy control over health information in electronic medical records. J. Am. Medical Informatics Assoc. 20(1): 7-15 (2013) - [c13]Karen Cheng, Kelly E. Caine, Wanda Pratt, Kay Connelly:
Consumer engagement in health technologies special interest group. CHI Extended Abstracts 2013: 2485-2488 - [c12]Priscilla Barnes, Kelly E. Caine, Kay Connelly, Katie A. Siek:
Understanding the needs of low SES patients with type 2 diabetes. PervasiveHealth 2013: 302-306 - 2012
- [j2]Shari Lawrence Pfleeger, Marc Rogers, Masooda N. Bashir, Kelly Caine, Deanna D. Caputo, Michael Losavio, Salvatore J. Stolfo:
Does Profiling Make Us More Secure? IEEE Secur. Priv. 10(4): 10-15 (2012) - [c11]Heather Richter Lipford, Pamela J. Wisniewski, Cliff Lampe, Lorraine G. Kisselburgh, Kelly Caine:
Reconciling privacy with social media. CSCW (Companion) 2012: 19-20 - [c10]Kelly Caine, Selma Sabanovic, Mary Carter:
The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults. HRI 2012: 343-350 - [c9]Ginger E. White, Katherine H. Connelly, Kelly E. Caine:
Opportunities for ubiquitous computing in the homes of low SES older adults. UbiComp 2012: 659-660 - 2011
- [j1]Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, Kalpana Shankar:
DigiSwitch: A Device to Allow Older Adults to Monitor and Direct the Collection and Transmission of Health Information Collected at Home. J. Medical Syst. 35(5): 1181-1195 (2011) - [c8]Kelly Caine, Lorraine G. Kisselburgh, Louise Lareau:
Audience visualization influences disclosures in online social networks. CHI Extended Abstracts 2011: 1663-1668 - 2010
- [c7]Kurt Luther, Kelly E. Caine, Kevin Ziegler, Amy S. Bruckman:
Why it works (when it works): success factors in online creative collaboration. GROUP 2010: 1-10 - [c6]Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, Alexander C. Sulgrove, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, Kalpana Shankar:
DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home. IHI 2010: 153-162
2000 – 2009
- 2009
- [b1]Kelly E. Caine:
Exploring everyday privacy behaviors and misclosures. Georgia Institute of Technology, Atlanta, GA, USA, 2009 - [c5]Kurt Luther, Kevin Ziegler, Kelly E. Caine, Amy S. Bruckman:
Predicting successful completion of online collaborative animation projects. Creativity & Cognition 2009: 391-392 - [c4]Susan Wyche, Kelly E. Caine, Benjamin K. Davison, Shwetak N. Patel, Michael Arteaga, Rebecca E. Grinter:
Sacred imagery in techno-spiritual design. CHI 2009: 55-58 - [c3]Kelly E. Caine:
Supporting privacy by preventing misclosure. CHI Extended Abstracts 2009: 3145-3148 - 2008
- [c2]Michelle Kwasny, Kelly E. Caine, Wendy A. Rogers, Arthur D. Fisk:
Privacy and technology: folk definitions and perspectives. CHI Extended Abstracts 2008: 3291-3296 - [c1]Susan Wyche, Kelly E. Caine, Benjamin K. Davison, Michael Arteaga, Rebecca E. Grinter:
Sun dial: exploring techno-spiritual design through a mobile islamic call to prayer application. CHI Extended Abstracts 2008: 3411-3416
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint