Rick Wash
YOU?
Author Swipe
View article: How an Online Health Support Community Responded to the COVID-19 Crisis
How an Online Health Support Community Responded to the COVID-19 Crisis Open
The scope and severity of the COVID-19 pandemic has introduced new challenges for people seeking health information online. To understand how an existing online community of people living with a chronic health condition navigate meeting th…
View article: The Value of Completing Crowdfunding Projects
The Value of Completing Crowdfunding Projects Open
Crowdfunding systems are social media websites that allow people to donate small amounts of money that add up to fund valuable larger projects. These websites are structured around projects: finite campaigns with well-defined goals, end da…
View article: Anyone else have this experience
Anyone else have this experience Open
Self-tracking technologies, ranging from digital thermometers to wearable fitness trackers, allow users to use personal data accumulated from their everyday activities. But, to use these data, people have to make sense of how these numbers…
View article: How Potential New Members Approach an Online Community
How Potential New Members Approach an Online Community Open
Online communities, socio-technical systems where people interact with others, depend on new members coming to the community. While the majority of research in online communities relation to the recruitment of new members has focused on ne…
View article: Prioritizing security over usability: Strategies for how people choose passwords
Prioritizing security over usability: Strategies for how people choose passwords Open
Passwords are one of the most common security technologies that people use everyday. Choosing a new password is a security decision that can have important consequences for end users. Passwords can be long and complex, which prioritizes th…
View article: How Experts Detect Phishing Scam Emails
How Experts Detect Phishing Scam Emails Open
Phishing scam emails are emails that pretend to be something they are not in order to get the recipient of the email to undertake some action they normally would not. While technical protections against phishing reduce the number of phishi…
View article: "The Most Trustworthy Coin"
"The Most Trustworthy Coin" Open
Bitcoin is an innovative technological network, a new, non-governmental currency, and a worldwide group of users. In other words, Bitcoin is a complex sociotechnical system with a complex set of risks and challenges for anyone using it. We…
View article: How "True Bitcoiners" Work on Reddit to Maintain Bitcoin
How "True Bitcoiners" Work on Reddit to Maintain Bitcoin Open
After the meteoric rise in price, and subsequent public interest, of the cryptocurrency Bitcoin, a developing body of work has begun examining its impact on society. In recent months, as Bitcoin's price has rapidly declined, uncertainty an…
View article: Who Provides Phishing Training?
Who Provides Phishing Training? Open
Humans represent one of the most persistent vulnerabilities in many computing systems. Since human users are independent agents who make their own choices, closing these vulnerabilities means persuading users to make different choices. Foc…
View article: The Rich Get Richer? Limited Learning in Charitable Giving on donorschoose.org
The Rich Get Richer? Limited Learning in Charitable Giving on donorschoose.org Open
Crowdfunding websites allow anyone to raise money through many financial contributions from the ‘crowd.’ One commonly cited social benefit of crowdfunding is the democratization of access to capital. The degree of the democratization depen…
View article: Highly Successful Projects Inhibit Coordination on Crowdfunding Sites
Highly Successful Projects Inhibit Coordination on Crowdfunding Sites Open
Donors on crowdfunding sites must coordinate their actions to identify and collectively fund projects prior to their deadline. Some projects receive vast support immediately upon launch. Other seemingly worthwhile projects have more modest…
View article: Identifying patterns in informal sources of security information
Identifying patterns in informal sources of security information Open
Computer users have access to computer security information from many different sources, but few people receive explicit computer security training. Despite this lack of formal education, users regularly make many important security decisi…