Andrea Forte
YOU?
Author Swipe
View article: University Students’ Use and Assessment of Chatbots as an Information Resource: An Exploratory Study
University Students’ Use and Assessment of Chatbots as an Information Resource: An Exploratory Study Open
The widespread use of AI chatbots has incited concerns about how chatbots will impact university students. In this work, we examine how students use chatbots as an information resource in their day‐to‐day lives. We present findings from an…
View article: Understanding how young adults assess the source credibility of misinformation and AI-generated content labels
Understanding how young adults assess the source credibility of misinformation and AI-generated content labels Open
The advent of the internet brought with it unprecedented access to information and potential for many people. However, the ease and speed with which information can be spread has also facilitated the proliferation of false and misleading i…
View article: Examining privacy concerns and conversations before, during, and after the onset of the COVID-19 pandemic: an analysis of r/privacy
Examining privacy concerns and conversations before, during, and after the onset of the COVID-19 pandemic: an analysis of r/privacy Open
Introduction. The COVID-19 pandemic brought about new and far-ranging uses of technology that have engendered numerous privacy concerns among the public. This study examines discussions in r/privacy, a privacy-focused online community, to …
View article: What to Expect When You’re Accessing: An Exploration of User Privacy Rights in People Search Websites
What to Expect When You’re Accessing: An Exploration of User Privacy Rights in People Search Websites Open
People Search Websites, a category of data brokers, collect, catalog, monetize and often publicly display individuals' personally identifiable information (PII). We present a study of user privacy rights in 20 such websites assessing the u…
View article: Trust and Transparency: An Exploratory Study on Emerging Adults' Interpretations of Credibility Indicators on Social Media Platforms
Trust and Transparency: An Exploratory Study on Emerging Adults' Interpretations of Credibility Indicators on Social Media Platforms Open
The misinformation crisis across social media has disrupted critical access to information in health, politics, and public safety. Content labels have become a feature that social media platforms use to signal credibility of social media p…
View article: Intersectional Thinking about PETs: A Study of Library Privacy
Intersectional Thinking about PETs: A Study of Library Privacy Open
This qualitative study examines the privacy challenges perceived by librarians who afford access to physical and electronic spaces and are in a unique position of safeguarding the privacy of their patrons. As internet “service providers,” …
View article: “It Feels Like Whack-a-mole”: User Experiences of Data Removal from People Search Websites
“It Feels Like Whack-a-mole”: User Experiences of Data Removal from People Search Websites Open
People Search Websites aggregate and publicize users’ Personal Identifiable Information (PII), previously sourced from data brokers. This paper presents a qualitative study of the perceptions and experiences of 18 participants who sought i…
View article: Privacy Research with Marginalized Groups: What We Know, What's Needed, and What's Next
Privacy Research with Marginalized Groups: What We Know, What's Needed, and What's Next Open
People who are marginalized experience disproportionate harms when their privacy is violated. Meeting their needs is vital for developing equitable and privacy-protective technologies. In response, research at the intersection of privacy a…
View article: Privacy and Vulnerable Populations
Privacy and Vulnerable Populations Open
Vulnerable populations face unique privacy risks that not only challenge designers’ preconceptions about privacy, these challenges are also frequently overlooked in decisions about privacy design and policy. This chapter defines and descri…
View article: Powerful Privacy Norms in Social Network Discourse
Powerful Privacy Norms in Social Network Discourse Open
Social media companies wield power over their users through design, policy, and through their participation in public discourse. We set out to understand how companies leverage public relations to influence expectations of privacy and priv…
View article: "I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers
"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers Open
While the Internet has dramatically increased the exposure that research can receive, it has also facilitated harassment against scholars. To understand the impact that these attacks can have on the work of researchers, we perform a series…
View article: Wedding Dresses and Wanted Criminals: Pinterest.com as an Infrastructure for Repository Building
Wedding Dresses and Wanted Criminals: Pinterest.com as an Infrastructure for Repository Building Open
We present findings from a qualitative study of activity on Pinterest.com, in which we investigated professional and personal uses of the site using interview data and observations of online activity. We find that Pinterest serves as an in…
View article: Grassroots Professional Development: How Teachers Use Twitter
Grassroots Professional Development: How Teachers Use Twitter Open
In an exploratory study, we used survey, interviews and content analysis techniques to understand how educators appropriate Twitter and other social media in their practice. We report on teachers’ use of Twitter, structural features of the…
View article: "I'm a Professor, which isn't usually a dangerous job":\n Internet-Facilitated Harassment and its Impact on Researchers
"I'm a Professor, which isn't usually a dangerous job":\n Internet-Facilitated Harassment and its Impact on Researchers Open
While the Internet has dramatically increased the exposure that research can\nreceive, it has also facilitated harassment against scholars. To understand the\nimpact that these attacks can have on the work of researchers, we perform a\nser…
View article: An Exploration of Privacy Experts' and Non-experts' Privacy Conceptualizations and Practices using the Concept of Habitus
An Exploration of Privacy Experts' and Non-experts' Privacy Conceptualizations and Practices using the Concept of Habitus Open
This dissertation examines the differences between the privacy practices of experts and non-experts via two studies. The first is a survey study that aims to construct an inventory of privacy-enhancing technologies used by privacy experts …
View article: The Politics of Privacy Theories: Moving from Norms to Vulnerabilities
The Politics of Privacy Theories: Moving from Norms to Vulnerabilities Open
Privacy and surveillance are central features of public discourse around use of computing systems. As the systems we design and study are increasingly used and regulated as potential instruments of surveillance, HCI researchers— even those…
View article: Replication Data for Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor
Replication Data for Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor Open
The dataset comprises revisions made by Tor users to various language versions of Wikipedia from October 2007 to February 2018. It also contains three sets of time-matched random samples of revisions made by groups of IP editors, First-tim…
View article: tor_ruwiki.tab
tor_ruwiki.tab Open
:unav
View article: tor_enwiki.tab
tor_enwiki.tab Open
:unav
View article: tor_eswiki.tab
tor_eswiki.tab Open
:unav
View article: tor_dewiki.tab
tor_dewiki.tab Open
:unav
View article: A Forensic Qualitative Analysis of Contributions to Wikipedia from Anonymity Seeking Users
A Forensic Qualitative Analysis of Contributions to Wikipedia from Anonymity Seeking Users Open
By choice or by necessity, some contributors to commons-based peer production sites use privacy-protecting services to remain anonymous. As anonymity seekers, users of the Tor network have been cast both as ill-intentioned vandals and as v…
View article: Reliability and Inter-rater Reliability in Qualitative Research
Reliability and Inter-rater Reliability in Qualitative Research Open
What does reliability mean for building a grounded theory? What about when writing an auto-ethnography? When is it appropriate to use measures like inter-rater reliability (IRR)? Reliability is a familiar concept in traditional scientific …
View article: Qualitative Methods for CSCW
Qualitative Methods for CSCW Open
Qualitative methods have long been an important component of CSCW research. However, it can be challenging to make qualitative work legible to a broader set of researchers, which is critical as mixed methods research becomes more common. M…
View article: How Service Providers Conceptualize Users and the Implications for Privacy
How Service Providers Conceptualize Users and the Implications for Privacy Open
In any online environment, users increasingly understand themselves to be relinquishing much of their control over privacy to the oversight and regulation of others, and must hope (although they may not necessarily believe) that those agen…
View article: A Next-Generation Core Network Architecture for Mobile Networks
A Next-Generation Core Network Architecture for Mobile Networks Open
Over the years, the cellular mobile network has evolved from a wireless plain telephone system to a very complex system providing telephone service, Internet connectivity and many interworking capabilities with other networks. Its air inte…
View article: Understanding Learning Curves and Trajectories in CSS Layout
Understanding Learning Curves and Trajectories in CSS Layout Open
Web development is a learning context with the potential to support rich computational thinking. Large-scale analysis of compilation and runtime errors have been used in introductory programming courses and similar approaches can be used t…
View article: Responding to Sensitive Disclosures on Social Media
Responding to Sensitive Disclosures on Social Media Open
When people disclose information on social media that is sensitive or potentially stigmatized (e.g., mental illness, pregnancy loss), how do others decide to respond? We use interviews and vignettes to provide a response decision-making fr…
View article: Testing Waters, Sending Clues
Testing Waters, Sending Clues Open
Indirect disclosure strategies include hinting about an experience or a facet of one's identity or relaying information explicitly but through another person. These strategies lend themselves to sharing stigmatized or sensitive experiences…