Elissa M. Redmiles

Orcid: 0000-0003-3930-8128

Affiliations:
  • Georgetown University, Washington D.C., USA
  • Microsoft Research (former)


According to our database1, Elissa M. Redmiles authored at least 86 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Safer Algorithmically-Mediated Offline Introductions: Harms and Protective Behaviors.
Proc. ACM Hum. Comput. Interact., 2024

Friction Matters: Balancing the Pursuit of Perfect Protection With Target Hardening.
IEEE Secur. Priv., 2024

Safer Digital Intimacy for Sex Workers and Beyond: A Technical Research Agenda.
IEEE Secur. Priv., 2024

Models Matter: Setting Accurate Privacy Expectations for Local and Central Differential Privacy.
CoRR, 2024

Laypeople's Egocentric Perceptions of Copyright for AI-Generated Art.
CoRR, 2024

The Role of Privacy Guarantees in Voluntary Donation of Private Data for Altruistic Goals.
CoRR, 2024

"Did They Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse.
CoRR, 2024

SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors.
Proceedings of the 33rd USENIX Security Symposium, 2024

"I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators.
Proceedings of the 33rd USENIX Security Symposium, 2024

"Did They F***ing Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse.
Proceedings of the 33rd USENIX Security Symposium, 2024

"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators.
Proceedings of the 33rd USENIX Security Symposium, 2024

"Violation of my body: " Perceptions of AI-generated non-consensual (intimate) imagery.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024

Analyzing User Engagement with TikTok's Short Format Video Recommendations using Data Donations.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

"I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
"I need a better description": An Investigation Into User Expectations For Differential Privacy.
J. Priv. Confidentiality, August, 2023

Power in Computer Security and Privacy: A Critical Lens.
IEEE Secur. Priv., 2023

Likes and Fragments: Examining Perceptions of Time Spent on TikTok.
CoRR, 2023

Leveraging Rights of Data Subjects for Social Media Analysis: Studying TikTok via Data Donations.
CoRR, 2023

What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy.
Proceedings of the 32nd USENIX Security Symposium, 2023

Exploring Privacy and Incentives Considerations in Adoption of COVID-19 Contact Tracing Apps.
Proceedings of the 32nd USENIX Security Symposium, 2023

Problematic Advertising and its Disparate Exposure on Facebook.
Proceedings of the 32nd USENIX Security Symposium, 2023

"Nudes? Shouldn't I charge for these?": Motivations of New Sexual Content Creators on OnlyFans.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Analyzing Biases in Perception of Truth in News Stories and Their Implications for Fact Checking.
IEEE Trans. Comput. Soc. Syst., 2022

Ctrl-Shift: How Privacy Sentiment Changed from 2019 to 2021.
Proc. Priv. Enhancing Technol., 2022

Risk, Resilience and Reward: Impacts of Shifting to Digital Sex Work.
Proc. ACM Hum. Comput. Interact., 2022

Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach.
Proc. ACM Hum. Comput. Interact., 2022

Not Only for Contact Tracing: Use of Belgium's Contact Tracing App among Young Adults.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Introduction to the Special Issue on Security and Privacy for COVID-19.
DTRAP, 2022

How Good is Good Enough? Quantifying the Impact of Benefits, Accuracy, and Privacy on Willingness to Adopt COVID-19 Decision Aids.
DTRAP, 2022

Examining the Landscape of Digital Safety and Privacy Assistance for Black Communities.
CoRR, 2022

"Nudes? Shouldn't I charge for these?" : Exploring What Motivates Content Creation on OnlyFans.
CoRR, 2022

"Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice.
Proceedings of the 31st USENIX Security Symposium, 2022

Community Under Surveillance: Impacts of Marginalization on an Online Labor Forum.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Ethical Practices for Security Research with At-Risk Populations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Dimensions of Diversity in Human Perceptions of Algorithmic Fairness.
Proceedings of the Equity and Access in Algorithms, Mechanisms, and Optimization, 2022

COVID-19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People's Adoption Intention.
Proceedings of the CHIIR '22: ACM SIGIR Conference on Human Information Interaction and Retrieval, Regensburg, Germany, March 14, 2022

Field Evidence of the Effects of Privacy, Data Transparency, and Pro-social Appeals on COVID-19 App Attractiveness.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

A Large-Scale Measurement of Cybercrime Against Individuals.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

The Need for Respectful Technologies: Going Beyond Privacy.
Perspectives on Digital Humanism, 2022

2021
Characterizing the Online Learning Landscape: What and How People Learn Online.
Proc. ACM Hum. Comput. Interact., 2021

User Concerns 8 Tradeoffs in Technology-facilitated COVID-19 Response.
Digit. Gov. Res. Pract., 2021

How we browse: Measurement and analysis of digital behavior.
CoRR, 2021

From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure Messaging.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online.
Proceedings of the 30th USENIX Security Symposium, 2021

Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns.
Proceedings of the 30th USENIX Security Symposium, 2021

Designing Media Provenance Indicators to Combat Fake Media.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

AMP: authentication of media via provenance.
Proceedings of the MMSys '21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021, 2021

"Disadvantaged in the American-dominated Internet": Sex, Work, and Technology.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

An Inside Look into the Practice of Malware Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Americans' willingness to adopt a COVID-19 tracking app The role of app distributor.
First Monday, 2020

Designing Indicators to Combat Fake Media.
CoRR, 2020

How good is good enough for COVID19 apps? The influence of benefits, accuracy, and privacy on willingness to adopt.
CoRR, 2020

Dimensions of Diversity in Human Perceptions of Algorithmic Fairness.
CoRR, 2020

User Concerns & Tradeoffs in Technology-Facilitated Contact Tracing.
CoRR, 2020

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.
Proceedings of the 29th USENIX Security Symposium, 2020

Get Paid to Program: Evaluating an Employment-Aware After-School Program for High School Women of Color.
Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education, 2020

2019
New Phone, Who Dis? Modeling Millennials' Backup Behavior.
ACM Trans. Web, 2019

Applied Digital Threat Modeling: It Works.
IEEE Secur. Priv., 2019

Auditing Offline Data Brokers via Facebook's Advertising Platform.
Proceedings of the World Wide Web Conference, 2019

How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

"Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

"I Just Want to Feel Safe": A Diary Study of Safety Perceptions on Social Media.
Proceedings of the Thirteenth International Conference on Web and Social Media, 2019

On Microtargeting Socially Divisive Ads: A Case Study of Russia-Linked Ad Campaigns on Facebook.
Proceedings of the Conference on Fairness, Accountability, and Transparency, 2019

Comparing and Developing Tools to Measure the Readability of Domain-Specific Texts.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

2018
Human Perceptions of Fairness in Algorithmic Decision Making: A Case Study of Criminal Risk Prediction.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level.
Proceedings of the 27th USENIX Security Symposium, 2018

Exploring User Mental Models of End-to-End Encrypted Communication Tools.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Dancing Pigs or Externalities?: Measuring the Rationality of Security Decisions.
Proceedings of the 2018 ACM Conference on Economics and Computation, 2018

Net Benefits: Digital Inequities in Social Capital, Privacy Preservation, and Digital Parenting Practices of U.S. Social Media Users.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

Diversifying the Next Generation of Information Scientists: Six Years of Implementation and Outcomes for a Year-Long REU Program.
Proceedings of the Transforming Digital Worlds - 13th International Conference, 2018

Examining the Demand for Spam: Who Clicks?
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Asking for a Friend: Evaluating Response Biases in Security User Studies.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Equitable Security: Optimizing Distribution of Nudges and Resources.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

Exploring User Perceptions of Discrimination in Online Targeted Advertising.
Proceedings of the 26th USENIX Security Symposium, 2017

You Want Me To Do What? A Design Study of Two-Factor Authentication Messages.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Where is the Digital Divide?: A Survey of Security, Privacy, and Socioeconomics.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Detecting fraud, corruption, and collusion in international development contracts: The design of a proof-of-concept automated system.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
A Classroom Tested Accessible Multimedia Resource for Engaging Underrepresented Students in Computing: The University of Maryland Curriculum In A Box.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

2014
An exploration of mentor-protégé relationships and how to train future mentors (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014


  Loading...