- Privacy, Security, and Data Protection
- Innovative Human-Technology Interaction
- Sexuality, Behavior, and Technology
- Technology Use by Older Adults
- Social Media and Politics
- Online Learning and Analytics
- Open Source Software Innovations
- Child Development and Digital Technology
- Gender, Feminism, and Media
- Wikis in Education and Collaboration
- Software Engineering Research
- Ethics and Social Impacts of AI
- Sex work and related issues
- Artificial Intelligence in Healthcare and Education
- Hate Speech and Cyberbullying Detection
- Impact of Technology on Adolescents
- Ethics in Business and Education
- Discourse Analysis in Language Studies
- AI and HR Technologies
- Complex Network Analysis Techniques
- Digital Communication and Language
- Cybercrime and Law Enforcement Studies
- Media Studies and Communication
- AI in Service Interactions
- Focus Groups and Qualitative Methods
George Mason University
2023-2025
University of Cincinnati
2021-2022
University of Maryland, Baltimore County
2020-2022
Drexel University
2012-2021
Philadelphia University
2020
What does reliability mean for building a grounded theory? about when writing an auto-ethnography? When is it appropriate to use measures like inter-rater (IRR)? Reliability familiar concept in traditional scientific practice, but how, and even whether establish qualitative research oft-debated question. For researchers highly interdisciplinary fields computer-supported cooperative work (CSCW) human-computer interaction (HCI), the question particularly complex as collaborators bring diverse...
A few studies have attempted to provide metrics of success in open source software (OSS) projects but the role a code hosting workspace plays how performance is viewed and measured little examined. We conducted qualitative, exploratory research with lead core developers on three successful GitHub understand OSS communities measure success. These results were obtained connection larger project that designed structure platforms relation participation performance. report two main findings....
The release of ChatGPT in November 2022 prompted a massive uptake generative artificial intelligence (GenAI) across higher education institutions (HEIs). HEIs scrambled to respond its use, especially by students, looking first regulate it and then arguing for productive integration within teaching learning. In the year since release, have increasingly provided policies guidelines direct GenAI. this paper we examined documents produced 116 US universities categorized as high research activity...
Privacy and surveillance are central features of public discourse around use computing systems. As the systems we design study increasingly used regulated as potential instruments surveillance, HCI researchers-even those whose focus is not privacy-find themselves needing to understand privacy in their work. Concepts like contextual integrity boundary regulation have become touchstones for thinking about HCI. In this paper, draw on literature limitations commonly theories examine assumptions,...
Now that the protections of Roe v. Wade are no longer available throughout United States, free flow personal data can be used by legal authorities to provide evidence felony. However, we know little about how impacted individuals approach their reproductive privacy in this new landscape. We conducted interviews with 15 who may get/were pregnant address gap. While nearly all reported deleting period tracking apps, they were not willing go much further, even while acknowledging risks...
Recent literature has demonstrated the limited and, in some instances, waning role of ethical training computing classes US. The capacity for artificial intelligence (AI) to be inequitable or harmful is well documented, yet it's an issue that continues lack apparent urgency effective mitigation. question we raise this paper how prepare future generations recognize and grapple with concerns a range issues plaguing AI, particularly when they are combined surveillance technologies ways have...
The introduction of generative artificial intelligence (GenAI) has been met with a mix reactions by higher education institutions, ranging from consternation and resistance to wholehearted acceptance. Previous work looked at the discourse policies adopted universities across U.S. as well educators, along inclusion GenAI-related content topics in education. Building on previous research, this study reports findings survey engineering educators their use perspectives toward AI. Specifically,...
Abstract The recent development and use of generative AI (GenAI) has signaled a significant shift in research activities such as brainstorming, proposal writing, dissemination, even reviewing. This raised questions about how to balance the seemingly productive uses GenAI with ethical concerns authorship copyright issues, biased training data, lack transparency, impact on user privacy. To address these concerns, many Higher Education Institutions (HEIs) have released institutional guidance...
Privacy researchers and designers must take into consideration the unique needs challenges of vulnerable populations. Normative privileged lenses can impair conceptualizations identities privacy needs, as well reinforce or exacerbate power structures struggles-and how they are formalized within research methods, theories, designs, analytical tools. The aim this one-day workshop is to facilitate discourse around alternative ways thinking about power, for researching designing technologies...
Qualitative methods have long been an important component of CSCW research. However, it can be challenging to make qualitative work legible a broader set researchers, which is critical as mixed research becomes more common. Moreover, the shift towards larger scales data and increasing calls for open transparency pose new questions in terms collection, analysis, reporting, sharing. This workshop brings together researchers discuss these challenges well opportunities methods, with goals help...
We studied the impact of introducing first-year computer science (CS) students to ethical thinking about social justice impacts data collection, tracking, bias, internet privacy, and competitive “real world” system design critique activities. While basic content was consistent for all, one group involved throughout course in peer discussions designed foster greater engagement, with anticipation that this would enable reach new levels sensitivity through peer-to-peer interaction. This article...
Social media apps present personalized content to users. Such is often described as "for you," raising questions about the relationship between users' sense of "self" and "you" that represented. Answering such pressing in case teen users whose identities are still forming. Thus we ask, "What do teens think their self?" We interviewed aged 13 17 (n = 15) experiences with on social media. Participants so routinely saw themselves accurately reflected they noted occasional inaccuracy surprise,...
Anonymity can enable both healthy online interactions like support-seeking and toxic behaviors hate speech. How do service providers balance these threats opportunities? This two-part qualitative study examines the challenges perceived by open collaboration in allowing anonymous contributions to their projects. We interviewed eleven people familiar with organizational decisions related privacy security at five projects followed up an analysis of public discussions about contribution...
Social media companies wield power over their users through design, policy, and participation in public discourse. We set out to understand how leverage relations influence expectations of privacy privacy-related norms. To interrogate the discourse productions relation privacy, we examine blogs associated with three major social platforms: Facebook, Instagram (both owned by Facebook Inc.), Snapchat. analyze posts using critical analysis demonstrate these powerful entities construct...
Designing technologies that support the mutual cybersecurity and autonomy of older adults facing cognitive challenges requires close collaboration partners. As part research to design a Safety Setting application for with memory loss or mild impairment (MCI), we use scenario-based participatory design. Our study builds on previous findings couples' approach was characterized by desire flexibility choice, an embrace role uncertainty. We find couples don't want system fundamentally alters...
Although internet access and affordability are increasingly at the center of policy decisions around issues “digital divide” in US, complex nature usage as it relates to structural inequality is not well-understood. We partnered with Project Waves, a community provider, set up connectivity across urban landscape city Eastern United States study factors that impact rollout affordable broadband low-income communities during COVID-19 pandemic. The organization endeavored meet challenges,...
A growing body of research suggests that intimate partner abusers use digital technologies to surveil their partners, including by installing spyware apps, compromising devices and online accounts, employing social engineering tactics. However, date, this form privacy violation, called surveillance (IPS), has primarily been studied from the perspective victim-survivors. We present a qualitative study how potential perpetrators IPS harness emotive power sharing personal narratives validate...
Efforts to include people with disabilities in design education are difficult scale, and dynamics of participation need be carefully planned avoid putting unnecessary burdens on users. However, given the scale emerging AI-enhanced technologies their potential for creating new vulnerabilities marginalized populations, methods generating empathy self-reflection technology students (as future creators such technologies) needed. We report a study Information Systems graduate where they used...
Designing technologies that support the cybersecurity of older adults with memory concerns involves wrestling an uncomfortable paradox between surveillance and independence close collaboration couples. This research captures interactions adult couples where one or both have concerns—a primary feature cognitive decline—as they make decisions on how to safeguard their online activities using a Safety Setting probe we designed, over course several informal interviews diary study. Throughout,...
In this paper, we apply concepts from Distributed Leadership, a theory suggesting that leadership is shared among members of an organization, to frame models contribution uncover in five relatively successful open source software (OSS) projects hosted on GitHub. qualitative, comparative case study, show how these make use GitHub features such as pull requests (PRs). We find which member PRs are more frequently merged with the codebase experience sustained participation. also higher success...
This qualitative study examines the privacy challenges perceived by librarians who afford access to physical and electronic spaces are in a unique position of safeguarding their patrons. As internet “service providers,” represent bridge between world, thus offer sight line convergence privacy, identity, social disadvantage. Drawing on interviews with 16 librarians, we describe how they often interpret or define own rules when it comes protect patrons face that stem from structures inequality...