The Role of Social Influence in Security Feature Adoption
Email overload at work
Understanding email use
Fruitful Feedback
Strangers on Your Phone: Why People Use Anonymous Communication Applications
Self-interruption on the computer
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW ’17
Proceedings of the SIGCHI conference on Human factors in computing systems - CHI ’05
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing - CSCW ’15
Proceedings of the 27th international conference on Human factors in computing systems - CHI 09
Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing - CSCW ’16
Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work - CSCW ’06
Robert E. Kraut
Steven P Dow
Jing Jin
Ruogu Kang
Sara Kiesler
Susan Fussell
Susceptibility to Social Influence of Privacy Behaviors
Best of Both Worlds: Improving Gmail Labels with the Affordances of Folders
Diminished Control in Crowdsourcing: An Investigation of Crowdworker Multitasking Behavior
Consensus Analysis of Shared Beliefs Among Young Adults About Anonymity in Social Media
Cloudy Forecast: An Exploration of the Factors Underlying Shared Repository Use
Online Feedback Exchange