Nora McDonald
Nora McDonald
George Mason University
Aucune adresse e-mail validée - Page d'accueil
Citée par
Citée par
Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice
N McDonald, S Schoenebeck, A Forte
Proceedings of the ACM on human-computer interaction 3 (CSCW), 1-23, 2019
Performance and participation in open source software on github
N McDonald, S Goggins
CHI'13 extended abstracts on human factors in computing systems, 139-144, 2013
The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums
E Tseng, R Bellini, N McDonald, M Danos, R Greenstadt, D McCoy, N Dell, ...
29th USENIX security symposium (USENIX Security 20), 1893-1909, 2020
The politics of privacy theories: Moving from norms to vulnerabilities
N McDonald, A Forte
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
Privacy and power: Acknowledging the importance of privacy research and design for vulnerable populations
N McDonald, K Badillo-Urquiola, MG Ames, N Dell, E Keneski, M Sleeper, ...
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020
" So-called privacy breeds evil" Narrative Justifications for Intimate Partner Surveillance in Online Forums
R Bellini, E Tseng, N McDonald, R Greenstadt, D McCoy, T Ristenpart, ...
Proceedings of the ACM on Human-Computer Interaction 4 (CSCW3), 1-27, 2021
Qualitative methods for CSCW: Challenges and opportunities
C Fiesler, JR Brubaker, A Forte, S Guha, N McDonald, M Muller
Conference companion publication of the 2019 on computer supported …, 2019
Privacy, anonymity, and perceived risk in open collaboration: A study of service providers
N McDonald, BM Hill, R Greenstadt, A Forte
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
Intersectional AI: A study of how information science students think about ethics and their impact
N McDonald, S Pan
Proceedings of the ACM on Human-Computer Interaction 4 (CSCW2), 1-19, 2020
Modeling distributed collaboration on Github
N McDonald, K Blincoe, EVA Petakovic, S Goggins
Advances in Complex Systems 17 (07n08), 1450024, 2014
Building for ‘we’: safety settings for couples with memory concerns
N McDonald, HM Mentis
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
Privacy and vulnerable populations
N McDonald, A Forte
Modern socio-technical perspectives on privacy, 337-363, 2022
Realizing choice: Online safeguards for couples adapting to cognitive challenges
N McDonald, A Larsen, A Battisti, G Madjaroff, A Massey, H Mentis
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 99-110, 2020
Sifting signal from noise: A new perspective on the meaning of tweets about the “big game”
I Graves, N McDonald, SP Goggins
new media & society 18 (2), 293-312, 2016
Powerful privacy norms in social network discourse
N McDonald, A Forte
Proceedings of the ACM on Human-Computer Interaction 5 (CSCW2), 1-27, 2021
“Citizens Too”: safety setting collaboration among older adults with memory concerns
N Mcdonald, HM Mentis
ACM Transactions on Computer-Human Interaction (TOCHI) 28 (5), 1-32, 2021
Responsible Computing: A Longitudinal Study of a Peer-led Ethics Learning Framework
N McDonald, A Akinsiku, J Hunter-Cevera, M Sanchez, K Kephart, ...
ACM Transactions on Computing Education (TOCE) 22 (4), 1-21, 2022
Rethinking the smart closet as an opportunity to enhance the social currency of clothing
JA Rode, R Magee, M Sebastian, A Black, R Yudell, A Gibran, ...
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 183-192, 2012
“I Did Watch ‘The Handmaid's Tale’”: Threat Modeling Privacy Post-Roe in the United States
N Mcdonald, N Andalibi
ACM Transactions on Computer-Human Interaction, 2023
A forensic qualitative analysis of contributions to Wikipedia from anonymity seeking users
K Champion, N McDonald, S Bankes, J Zhang, R Greenstadt, A Forte, ...
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-26, 2019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20