Følg
Nora McDonald
Nora McDonald
Verifisert e-postadresse på gmu.edu - Startside
Tittel
Sitert av
Sitert av
År
Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice
N McDonald, S Schoenebeck, A Forte
Proceedings of the ACM on human-computer interaction 3 (CSCW), 1-23, 2019
12362019
Performance and participation in open source software on github
N McDonald, S Goggins
CHI'13 extended abstracts on human factors in computing systems, 139-144, 2013
1332013
The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums
E Tseng, R Bellini, N McDonald, M Danos, R Greenstadt, D McCoy, N Dell, ...
29th USENIX security symposium (USENIX Security 20), 1893-1909, 2020
1022020
The politics of privacy theories: Moving from norms to vulnerabilities
N McDonald, A Forte
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
902020
Privacy and power: Acknowledging the importance of privacy research and design for vulnerable populations
N McDonald, K Badillo-Urquiola, MG Ames, N Dell, E Keneski, M Sleeper, ...
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020
562020
Generative artificial intelligence in higher education: Evidence from an analysis of institutional policies and guidelines
N McDonald, A Johri, A Ali, A Hingle
arXiv preprint arXiv:2402.01659, 2024
492024
" So-called privacy breeds evil" Narrative Justifications for Intimate Partner Surveillance in Online Forums
R Bellini, E Tseng, N McDonald, R Greenstadt, D McCoy, T Ristenpart, ...
Proceedings of the ACM on Human-Computer Interaction 4 (CSCW3), 1-27, 2021
412021
Intersectional AI: A study of how information science students think about ethics and their impact
N McDonald, S Pan
Proceedings of the ACM on Human-Computer Interaction 4 (CSCW2), 1-19, 2020
372020
Qualitative methods for CSCW: Challenges and opportunities
C Fiesler, JR Brubaker, A Forte, S Guha, N McDonald, M Muller
Companion Publication of the 2019 Conference on Computer Supported …, 2019
312019
Privacy, anonymity, and perceived risk in open collaboration: A study of service providers
N McDonald, BM Hill, R Greenstadt, A Forte
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
252019
Privacy and vulnerable populations
N McDonald, A Forte
Modern socio-technical perspectives on privacy, 337-363, 2022
242022
Building for ‘we’: safety settings for couples with memory concerns
N McDonald, HM Mentis
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
222021
Powerful privacy norms in social network discourse
N McDonald, A Forte
Proceedings of the ACM on Human-Computer Interaction 5 (CSCW2), 1-27, 2021
192021
Modeling distributed collaboration on Github
N McDonald, K Blincoe, EVA Petakovic, S Goggins
Advances in Complex Systems 17 (07n08), 1450024, 2014
192014
“I Did Watch ‘The Handmaid's Tale’”: Threat Modeling Privacy Post-roe in the United States
N Mcdonald, N Andalibi
ACM Transactions on Computer-Human Interaction 30 (4), 1-34, 2023
172023
Realizing choice: Online safeguards for couples adapting to cognitive challenges
N McDonald, A Larsen, A Battisti, G Madjaroff, A Massey, H Mentis
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 99-110, 2020
172020
Responsible computing: A longitudinal study of a peer-led ethics learning framework
N McDonald, A Akinsiku, J Hunter-Cevera, M Sanchez, K Kephart, ...
ACM Transactions on Computing Education (TOCE) 22 (4), 1-21, 2022
142022
“Citizens Too”: safety setting collaboration among older adults with memory concerns
N Mcdonald, HM Mentis
ACM Transactions on Computer-Human Interaction (TOCHI) 28 (5), 1-32, 2021
142021
Sifting signal from noise: A new perspective on the meaning of tweets about the “big game”
I Graves, N McDonald, SP Goggins
new media & society 18 (2), 293-312, 2016
132016
Intersectional thinking about PETs: A study of library privacy
N McDonald, R Greenstadt, A Forte
Proceedings on Privacy Enhancing Technologies, 2023
92023
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20