Designing for the deluge: understanding & supporting the distributed, collaborative work of crisis volunteers C Cobb, T McCarthy, A Perkins, A Bharadwaj, J Comis, B Do, K Starbird Proceedings of the 17th ACM conference on Computer supported cooperative …, 2014 | 135 | 2014 |
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention T Li, C Cobb, JJ Yang, S Baviskar, Y Agarwal, B Li, L Bauer, JI Hong Pervasive and Mobile Computing 75, 101439, 2021 | 73 | 2021 |
How public is my private life? Privacy in online dating C Cobb, T Kohno Proceedings of the 26th International Conference on World Wide Web, 1231-1240, 2017 | 56 | 2017 |
Computer security for data collection technologies C Cobb, S Sudar, N Reiter, R Anderson, F Roesner, T Kohno Proceedings of the Eighth International Conference on Information and …, 2016 | 44 | 2016 |
How Risky Are Real Users' IFTTT Applets? C Cobb, M Surbatovich, A Kawakami, M Sharif, L Bauer, A Das, L Jia Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 505-529, 2020 | 41 | 2020 |
" I would have to evaluate their objections": Privacy tensions between smart home device owners and incidental users. C Cobb, S Bhagavatula, KA Garrett, A Hoffman, V Rao, L Bauer Proc. Priv. Enhancing Technol. 2021 (4), 54-75, 2021 | 39 | 2021 |
“You Gotta Watch What You Say”: Surveillance of Communication with Incarcerated People K Owens, C Cobb, L Cranor Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021 | 19 | 2021 |
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention T Li, C Cobb, S Baviskar, Y Agarwal, B Li, L Bauer, JI Hong arXiv preprint arXiv:2012.12415, 2020 | 18 | 2020 |
User experiences with online status indicators C Cobb, L Simko, T Kohno, A Hiniker Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 13 | 2020 |
Leveraging user-privilege classification to customize usage-based statistical models of web applications S Sprenkle, C Cobb, L Pollock 2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012 | 8 | 2012 |
User-to-User Privacy in Social and Communications Applications C Cobb | 7 | 2019 |
Would You Rather: A Focus Group Method for Eliciting and Discussing Formative Design Insights with Children L Simko, B Chin, S Na, HK Saluja, TQ Zhu, T Kohno, A Hiniker, J Yip, ... Interaction Design and Children, 131-146, 2021 | 6 | 2021 |
Jackie (Junrui) Yang, Sagar Baviskar, Yuvraj Agarwal, Beibei Li, Lujo Bauer, and Jason I. Hong. 2021. What makes people install a COVID-19 contact-tracing app? Understanding … T Li, C Cobb Pervasive and Mobile Computing 75 (101439), 10.1016, 2021 | 5 | 2021 |
A User-Centric Evaluation of Smart Home Resolution Approaches for Conflicts Between Routines A Zaidi, R Yang, V Koshy, C Cobb, I Gupta, K Karahalios Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2023 | 3 | 2023 |
A Privacy-Focused Systematic Analysis of Online Status Indicators C Cobb, L Simko, T Kohno, A Hiniker Proceedings on Privacy Enhancing Technologies 2020 (3), 384-403, 2020 | 3 | 2020 |
SAFETAP: An Efficient Incremental Analyzer for Trigger-Action Programs MK McCall, FH Shezan, A Bichhawat, C Cobb, L Jia, Y Tian, C Grace, ... Carnegie Mellon University, 2021 | 2 | 2021 |
Speculative privacy concerns about AR glasses data collection A Gallardo, C Choy, J Juneja, E Bozkir, C Cobb, L Bauer, L Cranor Proceedings on Privacy Enhancing Technologies 4, 416-435, 2023 | 1 | 2023 |
CREU 2011 final report toward an effective data model and user session dependency model A Pobletts, C Cobb, L Simko | 1 | 2011 |
Towards Usable Security Analysis Tools for {Trigger-Action} Programming MK McCall, E Zeng, FH Shezan, M Yang, L Bauer, A Bichhawat, C Cobb, ... Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 301-320, 2023 | | 2023 |
The Buffet Overflow Café T Kohno, C Cobb, A Lerner, M Lin, A Shostack IEEE Security & Privacy 20 (04), 4-7, 2022 | | 2022 |