Follow
Tara Matthews
Title
Cited by
Year
SoK: Safer Digital-Safety Research Involving At-Risk Users
R Bellini, E Tseng, N Warford, A Daffalla, T Matthews, S Consolvo, ...
arXiv preprint arXiv:2309.00735, 2023
52023
{“Millions} of people are watching {you”}: Understanding the {Digital-Safety} Needs and Practices of Creators
P Samermit, A Turner, PG Kelley, T Matthews, V Wu, S Consolvo, ...
32nd USENIX Security Symposium (USENIX Security 23), 5629-5645, 2023
42023
SoK: A framework for unifying at-risk user research
N Warford, T Matthews, K Yang, O Akgul, S Consolvo, PG Kelley, ...
2022 IEEE Symposium on Security and Privacy (SP), 2344-2360, 2022
502022
" Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with {US}. political campaigns
S Consolvo, PG Kelley, T Matthews, K Thomas, L Dunn, E Bursztein
30th USENIX Security Symposium (USENIX Security 21), 1181-1198, 2021
122021
Toward gender-equitable privacy and security in south asia
N Sambasivan, N Ahmed, A Batool, E Bursztein, E Churchill, ...
IEEE Security & Privacy 17 (4), 71-77, 2019
172019
Tough times at transitional homeless shelters: Considering the impact of financial insecurity on digital security and privacy
M Sleeper, T Matthews, K O'Leary, A Turner, JP Woelfer, M Shelton, ...
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
192019
" They Don't Leave Us Alone Anywhere We Go" Gender and Digital Abuse in South Asia
N Sambasivan, A Batool, N Ahmed, T Matthews, K Thomas, ...
proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
1382019
łThey Don’t Leave Us Alone Anywhere We Gož: Gender and Digital Abuse in South Asia
N Sambasivan, A Batool, N Ahmed, T Matthews, K Thomas, ...
2019
Dynamic recommendation framework for information technology management
EM Haber, TL Matthews, CH Tan, SM Uttamchandani
US Patent 10,140,160, 2018
2018
" Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia
N Sambasivan, G Checkley, A Batool, N Ahmed, D Nemer, ...
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 127-142, 2018
1782018
Security and privacy experiences and practices of survivors of intimate partner abuse
T Matthews, K O’Leary, A Turner, M Sleeper, JP Woelfer, M Shelton, ...
IEEE Security & Privacy 15 (5), 76-81, 2017
92017
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
T Matthews, K O'Leary, A Turner, M Sleeper, JP Woelfer, M Shelton, ...
Proceedings of the 2017 CHI conference on human factors in computing systems …, 2017
2272017
Ranking and recommendation of online content
H Badenes, TL Matthews, BA Smith
US Patent 9,454,781, 2016
142016
" She'll just grab any device that's closer" A Study of Everyday Device & Account Sharing in Households
T Matthews, K Liao, A Turner, M Berkovich, R Reeder, S Consolvo
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1382016
Dynamic recommendation framework for information technology management
EM Haber, TL Matthews, CH Tan, SM Uttamchandani
US Patent 9,323,639, 2016
2016
When distance doesn't really matter: effects of geographic dispersion on participation in online enterprise communities
J Warshaw, S Whittaker, T Matthews, BA Smith
Proceedings of the 19th ACM Conference on Computer-Supported Cooperative …, 2016
122016
Evaluating a mobile transcription tool for the deaf
T Matthews, S Carter, C Pai, J Fong, J Mankoff
Behaviour 4206 (August), 2006, 2015
12015
Can an Algorithm Know the" Real You"? Understanding People's Reactions to Hyper-personal Analytics Systems
J Warshaw, T Matthews, S Whittaker, C Kau, M Bengualid, BA Smith
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
742015
They said what? Exploring the relationship between language use and member satisfaction in communities
T Matthews, JU Mahmud, J Chen, M Muller, E Haber, H Badenes
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
232015
Selecting an effective niche
H Zhu, J Chen, T Matthews, A Pal, H Badenes, RE Kraut
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20