Nora McDonald

ORCID: 0000-0003-0216-5573
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Innovative Human-Technology Interaction
  • Sexuality, Behavior, and Technology
  • Technology Use by Older Adults
  • Social Media and Politics
  • Online Learning and Analytics
  • Open Source Software Innovations
  • Child Development and Digital Technology
  • Gender, Feminism, and Media
  • Wikis in Education and Collaboration
  • Software Engineering Research
  • Ethics and Social Impacts of AI
  • Sex work and related issues
  • Artificial Intelligence in Healthcare and Education
  • Hate Speech and Cyberbullying Detection
  • Impact of Technology on Adolescents
  • Ethics in Business and Education
  • Discourse Analysis in Language Studies
  • AI and HR Technologies
  • Complex Network Analysis Techniques
  • Digital Communication and Language
  • Cybercrime and Law Enforcement Studies
  • Media Studies and Communication
  • AI in Service Interactions
  • Focus Groups and Qualitative Methods

George Mason University
2023-2025

University of Cincinnati
2021-2022

University of Maryland, Baltimore County
2020-2022

Drexel University
2012-2021

Philadelphia University
2020

What does reliability mean for building a grounded theory? about when writing an auto-ethnography? When is it appropriate to use measures like inter-rater (IRR)? Reliability familiar concept in traditional scientific practice, but how, and even whether establish qualitative research oft-debated question. For researchers highly interdisciplinary fields computer-supported cooperative work (CSCW) human-computer interaction (HCI), the question particularly complex as collaborators bring diverse...

10.1145/3359174 article EN Proceedings of the ACM on Human-Computer Interaction 2019-11-07

A few studies have attempted to provide metrics of success in open source software (OSS) projects but the role a code hosting workspace plays how performance is viewed and measured little examined. We conducted qualitative, exploratory research with lead core developers on three successful GitHub understand OSS communities measure success. These results were obtained connection larger project that designed structure platforms relation participation performance. report two main findings....

10.1145/2468356.2468382 article EN 2013-04-27

The release of ChatGPT in November 2022 prompted a massive uptake generative artificial intelligence (GenAI) across higher education institutions (HEIs). HEIs scrambled to respond its use, especially by students, looking first regulate it and then arguing for productive integration within teaching learning. In the year since release, have increasingly provided policies guidelines direct GenAI. this paper we examined documents produced 116 US universities categorized as high research activity...

10.48550/arxiv.2402.01659 preprint EN arXiv (Cornell University) 2024-01-12

Privacy and surveillance are central features of public discourse around use computing systems. As the systems we design study increasingly used regulated as potential instruments surveillance, HCI researchers-even those whose focus is not privacy-find themselves needing to understand privacy in their work. Concepts like contextual integrity boundary regulation have become touchstones for thinking about HCI. In this paper, draw on literature limitations commonly theories examine assumptions,...

10.1145/3313831.3376167 article EN 2020-04-21

Now that the protections of Roe v. Wade are no longer available throughout United States, free flow personal data can be used by legal authorities to provide evidence felony. However, we know little about how impacted individuals approach their reproductive privacy in this new landscape. We conducted interviews with 15 who may get/were pregnant address gap. While nearly all reported deleting period tracking apps, they were not willing go much further, even while acknowledging risks...

10.1145/3589960 article EN ACM Transactions on Computer-Human Interaction 2023-03-31

Recent literature has demonstrated the limited and, in some instances, waning role of ethical training computing classes US. The capacity for artificial intelligence (AI) to be inequitable or harmful is well documented, yet it's an issue that continues lack apparent urgency effective mitigation. question we raise this paper how prepare future generations recognize and grapple with concerns a range issues plaguing AI, particularly when they are combined surveillance technologies ways have...

10.1145/3415218 article EN Proceedings of the ACM on Human-Computer Interaction 2020-10-14

The introduction of generative artificial intelligence (GenAI) has been met with a mix reactions by higher education institutions, ranging from consternation and resistance to wholehearted acceptance. Previous work looked at the discourse policies adopted universities across U.S. as well educators, along inclusion GenAI-related content topics in education. Building on previous research, this study reports findings survey engineering educators their use perspectives toward AI. Specifically,...

10.48550/arxiv.2502.00569 preprint EN arXiv (Cornell University) 2025-02-01

Abstract The recent development and use of generative AI (GenAI) has signaled a significant shift in research activities such as brainstorming, proposal writing, dissemination, even reviewing. This raised questions about how to balance the seemingly productive uses GenAI with ethical concerns authorship copyright issues, biased training data, lack transparency, impact on user privacy. To address these concerns, many Higher Education Institutions (HEIs) have released institutional guidance...

10.1007/s43681-025-00688-7 article EN cc-by AI and Ethics 2025-03-06

Privacy researchers and designers must take into consideration the unique needs challenges of vulnerable populations. Normative privileged lenses can impair conceptualizations identities privacy needs, as well reinforce or exacerbate power structures struggles-and how they are formalized within research methods, theories, designs, analytical tools. The aim this one-day workshop is to facilitate discourse around alternative ways thinking about power, for researching designing technologies...

10.1145/3334480.3375174 article EN 2020-04-25

Qualitative methods have long been an important component of CSCW research. However, it can be challenging to make qualitative work legible a broader set researchers, which is critical as mixed research becomes more common. Moreover, the shift towards larger scales data and increasing calls for open transparency pose new questions in terms collection, analysis, reporting, sharing. This workshop brings together researchers discuss these challenges well opportunities methods, with goals help...

10.1145/3311957.3359428 article EN 2019-11-07

We studied the impact of introducing first-year computer science (CS) students to ethical thinking about social justice impacts data collection, tracking, bias, internet privacy, and competitive “real world” system design critique activities. While basic content was consistent for all, one group involved throughout course in peer discussions designed foster greater engagement, with anticipation that this would enable reach new levels sensitivity through peer-to-peer interaction. This article...

10.1145/3469130 article EN ACM Transactions on Computing Education 2022-04-29

Social media apps present personalized content to users. Such is often described as "for you," raising questions about the relationship between users' sense of "self" and "you" that represented. Answering such pressing in case teen users whose identities are still forming. Thus we ask, "What do teens think their self?" We interviewed aged 13 17 (n = 15) experiences with on social media. Participants so routinely saw themselves accurately reflected they noted occasional inaccuracy surprise,...

10.1145/3613904.3642297 article EN 2024-05-11

Anonymity can enable both healthy online interactions like support-seeking and toxic behaviors hate speech. How do service providers balance these threats opportunities? This two-part qualitative study examines the challenges perceived by open collaboration in allowing anonymous contributions to their projects. We interviewed eleven people familiar with organizational decisions related privacy security at five projects followed up an analysis of public discussions about contribution...

10.1145/3290605.3300901 article EN 2019-04-29

Social media companies wield power over their users through design, policy, and participation in public discourse. We set out to understand how leverage relations influence expectations of privacy privacy-related norms. To interrogate the discourse productions relation privacy, we examine blogs associated with three major social platforms: Facebook, Instagram (both owned by Facebook Inc.), Snapchat. analyze posts using critical analysis demonstrate these powerful entities construct...

10.1145/3479565 article EN public-domain Proceedings of the ACM on Human-Computer Interaction 2021-10-13

Designing technologies that support the mutual cybersecurity and autonomy of older adults facing cognitive challenges requires close collaboration partners. As part research to design a Safety Setting application for with memory loss or mild impairment (MCI), we use scenario-based participatory design. Our study builds on previous findings couples' approach was characterized by desire flexibility choice, an embrace role uncertainty. We find couples don't want system fundamentally alters...

10.1145/3411764.3445071 article EN 2021-05-06

Although internet access and affordability are increasingly at the center of policy decisions around issues “digital divide” in US, complex nature usage as it relates to structural inequality is not well-understood. We partnered with Project Waves, a community provider, set up connectivity across urban landscape city Eastern United States study factors that impact rollout affordable broadband low-income communities during COVID-19 pandemic. The organization endeavored meet challenges,...

10.1145/3677326 article EN ACM Journal on Computing and Sustainable Societies 2024-07-11

A growing body of research suggests that intimate partner abusers use digital technologies to surveil their partners, including by installing spyware apps, compromising devices and online accounts, employing social engineering tactics. However, date, this form privacy violation, called surveillance (IPS), has primarily been studied from the perspective victim-survivors. We present a qualitative study how potential perpetrators IPS harness emotive power sharing personal narratives validate...

10.1145/3432909 article EN Proceedings of the ACM on Human-Computer Interaction 2021-01-05

Efforts to include people with disabilities in design education are difficult scale, and dynamics of participation need be carefully planned avoid putting unnecessary burdens on users. However, given the scale emerging AI-enhanced technologies their potential for creating new vulnerabilities marginalized populations, methods generating empathy self-reflection technology students (as future creators such technologies) needed. We report a study Information Systems graduate where they used...

10.54337/ojs.jpblhe.v11i2.7667 article EN cc-by Journal of Problem Based Learning in Higher Education 2023-10-10

Designing technologies that support the cybersecurity of older adults with memory concerns involves wrestling an uncomfortable paradox between surveillance and independence close collaboration couples. This research captures interactions adult couples where one or both have concerns—a primary feature cognitive decline—as they make decisions on how to safeguard their online activities using a Safety Setting probe we designed, over course several informal interviews diary study. Throughout,...

10.1145/3465217 article EN ACM Transactions on Computer-Human Interaction 2021-08-20

In this paper, we apply concepts from Distributed Leadership, a theory suggesting that leadership is shared among members of an organization, to frame models contribution uncover in five relatively successful open source software (OSS) projects hosted on GitHub. qualitative, comparative case study, show how these make use GitHub features such as pull requests (PRs). We find which member PRs are more frequently merged with the codebase experience sustained participation. also higher success...

10.1142/s0219525914500246 article EN Advances in Complex Systems 2014-12-01

This qualitative study examines the privacy challenges perceived by librarians who afford access to physical and electronic spaces are in a unique position of safeguarding their patrons. As internet “service providers,” represent bridge between world, thus offer sight line convergence privacy, identity, social disadvantage. Drawing on interviews with 16 librarians, we describe how they often interpret or define own rules when it comes protect patrons face that stem from structures inequality...

10.56553/popets-2023-0064 article EN cc-by Proceedings on Privacy Enhancing Technologies 2023-03-07
Coming Soon ...