<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
<title type="text">Emilee Rader</title>
<generator uri="https://github.com/jekyll/jekyll">Jekyll</generator>
<link rel="self" type="application/atom+xml" href="https://emileerader.com/feed.xml" />
<link rel="alternate" type="text/html" href="https://emileerader.com" />
<updated>2025-08-15T23:20:37+00:00</updated>
<id>https://emileerader.com/</id>
<author>
  <name>Emilee Rader</name>
  <uri>https://emileerader.com/</uri>
  <email>ejrader2@wisc.edu</email>
</author>


<entry>
  <title type="html"><![CDATA["I didn't know I was that much of a bad boy": Surprise about Driving Data]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/workshop/driving-data-surprise-soups2025/" />
  <id>https://emileerader.com/workshop/driving-data-surprise-soups2025</id>
  <published>2025-08-11T00:00:00+00:00</published>
  <updated>2025-08-11T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;Driving a car is an important part of daily life for most people in the United States. However, people have a limited understanding of the privacy risks associated with data collected in an automotive context. The goal of this research was to investigate people’s awareness and perceptions of data collected about them by their cars, to better understand how their existing knowledge might affect how they think about driving data privacy. This poster presents preliminary findings from interviews focusing on participants’ reactions to data collected about their driving over a 12 week period. Participants were surprised by their driving data when it did not match what they remembered about their driving, and when it revealed broader patterns about their lives beyond their cars. Surprise signals an expectation violation due to unexpected data practices, which indicates data collection and use that participants did not anticipate. People cannot make informed privacy decisions about data and inferences they are not aware of, and so identifying when and why surprise occurs can help privacy designers create interventions targeted towards gaps in user knowledge.&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/workshop/driving-data-surprise-soups2025/&quot;&gt;&quot;I didn&apos;t know I was that much of a bad boy&quot;: Surprise about Driving Data&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on August 11, 2025.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[The future of personal information management in the age of ubiquitous personal data]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/workshop/pim-special-issue-intro/" />
  <id>https://emileerader.com/workshop/pim-special-issue-intro</id>
  <published>2025-03-27T00:00:00+00:00</published>
  <updated>2025-03-27T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;Personal Information Management (PIM) is integral to our daily lives, encompassing the collection, retrieval, consumption, and management of personal data such as e-mails, messages, files, photos, music, social media and web information. PIM is enacted for work, study, and entertainment purposes. While some PIM technologies like files and folders have been around for decades, others like cloud storage, music recommendations, and photo search are more recent. These technological shifts bring new challenges to PIM, which this special issue aims to address. The proliferation of mobile phones and social media has increased the taking and sharing of photos, while AI technologies are transforming our music and video consumption habits. Additionally, regulations like General Data Protection Regulation (GDPR) impose legal requirements on technology providers, while users are becoming increasingly concerned about the privacy of their personal information. This special issue seeks both to enhance our understanding of PIM behaviors with mature technologies and also to identify emerging research topics related to new technologies and regulations.&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/workshop/pim-special-issue-intro/&quot;&gt;The future of personal information management in the age of ubiquitous personal data&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on March 27, 2025.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[Speculating About Multi-user Conversational Interfaces and LLMs: What If Chating Wasn’t So Lonely?]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/workshop/LLM-provocation-cui2024/" />
  <id>https://emileerader.com/workshop/LLM-provocation-cui2024</id>
  <published>2024-07-01T00:00:00+00:00</published>
  <updated>2024-07-01T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;The advent of LLMs means that CUIs are cool again, but what isn’t so cool is that we’re doomed to use them alone. The one user, one account, one device paradigm has dominated the design of CUIs and is not going away as new conversational technologies emerge. In this provocation we explore some of the technical, legal, and design difficulties that seem to make multi-user CUIs so difficult to implement. Drawing inspiration from the ways that people manage messy group discussions, such as parliamentary and consensus-based paradigms, we show how LLM-based CUIs might be well suited to bridging the gap. With any luck, this might even result in everyone having to sit through fewer poorly run meetings and agonising group discussions—truly a laudable goal!&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/workshop/LLM-provocation-cui2024/&quot;&gt;Speculating About Multi-user Conversational Interfaces and LLMs: What If Chating Wasn’t So Lonely?&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on July 01, 2024.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[Data Privacy and Pluralistic Ignorance]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/conference/pluralistic-ignorance-soups2023/" />
  <id>https://emileerader.com/conference/pluralistic-ignorance-soups2023</id>
  <published>2023-06-28T00:00:00+00:00</published>
  <updated>2023-06-28T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;!-- link: &quot;https://www.usenix.org/conference/soups2022/presentation/rader&quot; --&gt;

&lt;p&gt;This paper presents the results of an online survey experiment with 746 participants that investigated whether social norms influence people’s choices about using technologies that can infer information they might not want to disclose. The results show both correlational and causal evidence that empirical expectations (beliefs about what others do) and normative expectations (beliefs about what others believe) influence choices to use mobile devices in ways that generate data that could be used to make sensitive inferences. However, participants also reported concern about data privacy, and lower behavioral intentions for vignettes involving more invasive inferences. Pluralistic ignorance is a phenomenon where indi- viduals behave in ways they privately disagree with, because they see others around them behaving the same way and assume this is evidence most people approve of the behavior. These results are consistent with the existence of pluralistic ignorance related to data privacy, and suggest that interventions focused on transparency about data practices are not enough to encourage people to make different privacy choices.&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/conference/pluralistic-ignorance-soups2023/&quot;&gt;Data Privacy and Pluralistic Ignorance&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on June 28, 2023.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[Normative and Non-Social Beliefs about Sensor Data: Implications for Collective Privacy Management]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/conference/norms-soups2022/" />
  <id>https://emileerader.com/conference/norms-soups2022</id>
  <published>2022-06-28T00:00:00+00:00</published>
  <updated>2022-06-28T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;Sensors embedded in wearable and smart home devices collect data that can be used to infer sensitive, private details about people’s lives. Privacy norms have been proposed as a foundation upon which people might coordinate to set and enforce preferences for acceptable or unacceptable data practices. Through a qualitative study, this research explored whether normative beliefs influenced participants’ reactions to plausible but unexpected inferences that could be made from sensor data collected by everyday wearable and smart home devices. Some reactions were grounded in normative beliefs involving existing disclosure taboos, while others stigmatized the choice to limit one’s use of technologies to preserve one’s privacy. The visible nature of others’ technology use contradicts individual concern about sensor data privacy, which may lead to an incorrect assumption that privacy is not important to other people. Findings suggest that this is a barrier to collective privacy management, and that awareness interventions focused on information about the beliefs of other users may be helpful for collective action related to data privacy.&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/conference/norms-soups2022/&quot;&gt;Normative and Non-Social Beliefs about Sensor Data: Implications for Collective Privacy Management&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on June 28, 2022.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[You have to be hyperaware: PhD students' management of boundary turbulence when posting research-related information on social media]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/workshop/boundary-turbulence-poster-soups2022/" />
  <id>https://emileerader.com/workshop/boundary-turbulence-poster-soups2022</id>
  <published>2022-06-28T00:00:00+00:00</published>
  <updated>2022-06-28T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;What informs the disclosure decisions made by early-career scientists when they share their research on social network sites, such as social media? We conducted 14 interviews to investigate how science PhD students in the United States and the Philippines perceive and manage boundary turbulence when they share research-related information online. Through a qualitative analysis that applied Petronio’s theory of Communication Privacy Management (CPM) we identify major themes from our interviews. These themes include participants’ perceptions of the risks, benefits, and ways of minmizing risks when sharing research-related information on social media. We discuss the implications of these findings for our interviewee population, and connect it to broader implications for stakeholders in science communication and CPM.&lt;/p&gt;

&lt;!--
file: 
poster: 
--&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/workshop/boundary-turbulence-poster-soups2022/&quot;&gt;You have to be hyperaware: PhD students&apos; management of boundary turbulence when posting research-related information on social media&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on June 28, 2022.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[Replication: Stories as Informal Lessons about Security]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/conference/stories-replication-soups2022/" />
  <id>https://emileerader.com/conference/stories-replication-soups2022</id>
  <published>2022-06-27T00:00:00+00:00</published>
  <updated>2022-06-27T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;Anecdotal stories about security threats told to non-experts by friends, peers, or the media have been shown to be important in forming mental models and secure behaviors. In 2012, Rader et al. conducted a survey (n=301) of security stories with a student sample to determine factors that influence security perceptions and behavior. We replicated this survey with a more diverse sample (n=299), including different age groups and educational backgrounds. We were able to confirm many of the original findings, providing further evidence that certain characteristics of stories increase the likelihood of learning and retelling. Moreover, we contribute new insights into how people learn from stories, such as that younger and higher educated people are less likely to change their thinking or be emotionally influenced by stories. We (re)discovered all of the threat themes found by Rader et al., suggesting that these threats have not been eliminated in the last decade, and found new ones such as ransomware and data breaches. Our findings help to improve the design of security advise and education for non-experts.&lt;/p&gt;

&lt;!--
file: 
link: 
--&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/conference/stories-replication-soups2022/&quot;&gt;Replication: Stories as Informal Lessons about Security&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on June 27, 2022.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA["Assertive driver, I can imagine that": Interpretations of Inferences from Driving Data]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/workshop/driving-inferences-poster-soups2021/" />
  <id>https://emileerader.com/workshop/driving-inferences-poster-soups2021</id>
  <published>2021-06-28T00:00:00+00:00</published>
  <updated>2021-06-28T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;Privacy in sensor-based systems must be studied in the context of lived experiences to understand how behavior may differ from stated preferences. In this study, we showed participants inferences about their driving style that we generated from data about their actual driving behavior, and qualitatively analyzed their reactions. Preliminary findings suggest most participants rationalized the inferences by making them fit within their positive image of their own driving. This suggests that people may find it difficult to conceptualize uses of inferences that run counter to their self-interest, making it hard to make informed privacy choices. We argue that the process for seeking consent for the collection of sensor data should communicate not only how inferences were generated and what they are, but also specifically how they are to be used.&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/workshop/driving-inferences-poster-soups2021/&quot;&gt;&quot;Assertive driver, I can imagine that&quot;: Interpretations of Inferences from Driving Data&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on June 28, 2021.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[Prioritizing security over usability: Strategies for how people choose passwords]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/workshop/JCS-paper-poster-soups2021/" />
  <id>https://emileerader.com/workshop/JCS-paper-poster-soups2021</id>
  <published>2021-06-28T00:00:00+00:00</published>
  <updated>2021-06-28T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/workshop/JCS-paper-poster-soups2021/&quot;&gt;Prioritizing security over usability: Strategies for how people choose passwords&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on June 28, 2021.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/conference/non-expert-phishing-soups2021/" />
  <id>https://emileerader.com/conference/non-expert-phishing-soups2021</id>
  <published>2021-05-26T00:00:00+00:00</published>
  <updated>2021-05-26T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;Phishing emails are scam communications that pretend to be something they are not in order to get people to take actions they otherwise would not. We surveyed a demographically matched sample of 297 people from across the United States and asked them to share their descriptions of a specific experience with a phishing email. Analyzing these experiences, we found that email users’ experiences detecting phishing messages have many properties in common with how IT experts identify phishing. We also found that email users bring unique knowledge and valuable capabilities to this identification process that neither technical controls nor IT experts have. We suggest that targeting training toward how to use this uniqueness is likely to improve phishing prevention.&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/conference/non-expert-phishing-soups2021/&quot;&gt;Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on May 26, 2021.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[Prioritizing Security over Usability: Strategies for How People Choose Passwords]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/journal/password-security-vs-usability/" />
  <id>https://emileerader.com/journal/password-security-vs-usability</id>
  <published>2021-04-28T00:00:00+00:00</published>
  <updated>2021-04-28T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;Passwords are one of the most common security technologies that people use ev- eryday. Choosing a new password is a security decision that can have important consequences for end users. Passwords can be long and complex, which prioritizes the security-focused aspects of a password. They can also be simple — easy to create, remember and use — which prioritizes the usability aspects of the password. The trade-off between password security versus usability represents competing constraints that shape password creation and use. We examined an ecologically valid dataset of 853 passwords entered a total of 2533 times by 134 users into 1010 websites, to test hypotheses about the impact of these constraints. We found evidence that choices about password complexity reflect an emphasis on security needs, but little support for the hypothesis that users take day-to-day ease of use of the password into account when creating it. There was also little evidence that password creation policies drive password choices.&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/journal/password-security-vs-usability/&quot;&gt;Prioritizing Security over Usability: Strategies for How People Choose Passwords&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on April 28, 2021.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[Towards a Conceptual Model for Provoking Privacy Speculation]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/workshop/soups-privacy-speculation/" />
  <id>https://emileerader.com/workshop/soups-privacy-speculation</id>
  <published>2020-08-10T00:00:00+00:00</published>
  <updated>2020-08-10T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;The proliferation of ubiquitous computing introduces several challenges to user privacy. Data from multiple sensors and users is aggregated at various scales to produce new, fine- grained inferences about people. Users of these systems are asked to consent to sharing their data without full knowledge of what data are recorded, how the data are and might be used, who has access to the data, and most importantly risks associated with sharing. Recent work has shown that provok- ing privacy speculation among system users, by visualizing these various aspects, improves user knowledge and enables them to make informed decisions about their data. This paper presents a conceptual model of how researchers can make inferences that provoke privacy speculation among system users and a case study applying the model.&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/workshop/soups-privacy-speculation/&quot;&gt;Towards a Conceptual Model for Provoking Privacy Speculation&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on August 10, 2020.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[I Have a Narrow Thought Process: Constraints on Explanations Connecting Inferences and Self-Perceptions]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/conference/ad-inferences-soups2020/" />
  <id>https://emileerader.com/conference/ad-inferences-soups2020</id>
  <published>2020-05-22T00:00:00+00:00</published>
  <updated>2020-05-22T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;Most people are unfamiliar with the kinds of inferences that platforms like Facebook and Google can automatically associate with them, despite the existence of interfaces designed to provide transparency to end users. We conducted a study to investigate people’s reactions upon being exposed to these inferences, to learn if and how they perceived the inferences to be connected to themselves. Through qualitative analysis, we found that the evidence participants used to relate the inferences with their self-perceptions was bounded by what they remembered about their own past behaviors in connection with the platform. Inferences that participants felt were implausible given their own behavior were rationalized as being related to family members, outdated, or could fit anyone with similar demographic characteristics. Participants also identified some inferences they believed had no connection with themselves whatsoever. We discuss implications for how participants’ reasoning might lead to expectations about what kinds of inferences are possible, and what this means for people’s ability to make informed privacy decisions regarding consent and disclosure.&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/conference/ad-inferences-soups2020/&quot;&gt;I Have a Narrow Thought Process: Constraints on Explanations Connecting Inferences and Self-Perceptions&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on May 22, 2020.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[It's the Wild, Wild West: Lessons Learned From IRB Members' Risk Perceptions Toward Digital Research Data]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/journal/cscw20-irb-risk/" />
  <id>https://emileerader.com/journal/cscw20-irb-risk</id>
  <published>2020-04-08T00:00:00+00:00</published>
  <updated>2020-04-08T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;Digital technology that is prevalent in people’s everyday lives, including smart home devices, mobile apps and social media, increasingly lack regulations for how the user data can be collected, used or disseminated. The CSCW and the larger computing community continue to evaluate and understand the potential negative impacts of research involving digital technologies. As more research involves digital data, Institutional Review Boards (IRBs) take on the difficult task of evaluating and determining risks—likelihood of potential harms— from digital research. Learning more about IRBs’ role in concretizing harm and its likelihood will help us critically examine the current approach to regulating digital research, and has implications for how researchers can reflect on their own data practices. We interviewed 22 U.S.-based IRB members and found that, for the interviewees, “being digital” added a risk. Being digital meant increasing possibilities of confidentiality breach, unintended collection of sensitive information, and unauthorized data reuse. Concurrently, interviewees found it difficult to pinpoint the direct harms that come out of those risks. The ambiguous, messy, and situated contexts of digital research data did not fit neatly into current human subjects research protection protocols. We discuss potential solutions for understanding risks and harms of digital technology and implications for the responsibilities of the CSCW and the larger computing community in conducting digital research.&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/journal/cscw20-irb-risk/&quot;&gt;It&apos;s the Wild, Wild West: Lessons Learned From IRB Members&apos; Risk Perceptions Toward Digital Research Data&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on April 08, 2020.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[The Role of Conversational Grounding in Supporting Symbiosis Between People and Digital Assistants]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/journal/cscw20-google-home-symbiosis/" />
  <id>https://emileerader.com/journal/cscw20-google-home-symbiosis</id>
  <published>2020-04-08T00:00:00+00:00</published>
  <updated>2020-04-08T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;In “smart speaker” digital assistant systems such as Google Home, there is no visual user interface, so people must learn about the system’s capabilities and limitations by experimenting with different questions and commands. However, many new users give up quickly and limit their use to a few simple tasks. This is a problem for both the user and the system. Users who stop trying out new things cannot learn about new features and functionality, and the system receives less data upon which to base future improvements. Symbiosis—a mutually beneficial relationship—between AI systems like digital assistants and people is an important aspect of developing systems that are partners to humans and not just tools. In order to better understand requirements for symbiosis, we investigated the relationship between the types of digital assistant responses and users’ subsequent questions, focusing on identifying interactions that were discouraging to users when speaking with a digital assistant. We conducted a user study with 20 participants who completed a series of information seeking tasks using the Google Home, and analyzed transcripts using a method based on applied conversation analysis. We found that the most common response from the Google Home, a version of “Sorry, I’m not sure how to help”, provided no feedback for participants to build on when forming their next question. However, responses that provided somewhat strange but tangentially related answers were actually more helpful for conversational grounding, which extended the interaction. We discuss the connection between grounding and symbiosis, and present recommendations for requirements for forming partnerships with digital assistants.&lt;/p&gt;


    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/journal/cscw20-google-home-symbiosis/&quot;&gt;The Role of Conversational Grounding in Supporting Symbiosis Between People and Digital Assistants&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on April 08, 2020.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[That's Not Me: Surprising Algorithmic Inferences]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/workshop/lbw-surprising-algorithmic-inferences/" />
  <id>https://emileerader.com/workshop/lbw-surprising-algorithmic-inferences</id>
  <published>2020-02-15T00:00:00+00:00</published>
  <updated>2020-02-15T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;Online platforms such as Google and Facebook make inferences about users based on data from their online and offline behavior that can be used for various purposes. Though some of these inferences are available for users to view, there exists a gap between what platforms are actually able to infer from collected data and what inferences users are expecting or believe to be possible. Studying users’ reactions to inferences made about them, espe- cially what surprises them, allows us to better understand this gap. We interviewed users of Google and Facebook to learn their current beliefs and expectations about how these platforms use their data to make inferences, and identified four common sources of surprise for participants: irrelevant inferences, outdated inferences, inferences with no connection to online activity, and inferences related to friends or family. We discuss the implications for designing inference-generating systems.&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/workshop/lbw-surprising-algorithmic-inferences/&quot;&gt;That&apos;s Not Me: Surprising Algorithmic Inferences&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on February 15, 2020.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[Towards a Conceptual Model for Provoking Privacy Speculation]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/workshop/lbw-privacy-speculation/" />
  <id>https://emileerader.com/workshop/lbw-privacy-speculation</id>
  <published>2020-02-15T00:00:00+00:00</published>
  <updated>2020-02-15T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;The proliferation of ubiquitous computing introduces several challenges to user privacy. Data from multiple sensors and users is aggregated at various scales to produce new, fine-grained inferences about people. Users of these systems are asked to consent to sharing their data without full knowledge of what data are recorded, how the data are used, who has access to the data, and most importantly risks associated with sharing. Recent work has shown that provoking privacy speculation among system users, by visualizing these various aspects, improves user knowledge and enables them to make informed decisions about their data. This paper presents a conceptual model of how researchers can make inferences that provoke privacy speculation among system users and a case study applying the model.&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/workshop/lbw-privacy-speculation/&quot;&gt;Towards a Conceptual Model for Provoking Privacy Speculation&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on February 15, 2020.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted Email]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/conference/unsubscribing-chi/" />
  <id>https://emileerader.com/conference/unsubscribing-chi</id>
  <published>2020-01-18T00:00:00+00:00</published>
  <updated>2020-01-18T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;A large proportion of email messages in an average Internet user’s inbox are unwanted commercial messages from mailing lists, bots, and so on. Although such messages often include instructions to unsubscribe, people still struggle with stopping unwanted email. We investigated the user experience of un- subscribing from unwanted email messages by recruiting 18 individuals for via a lab study followed by semi-structured interviews. Based on unsubscribing practices of the study participants, we synthesized eight common unsubscription mechanisms and identified the corresponding user experience challenges. We further uncovered alternative practices aimed at circumventing the need to unsubscribe. Our findings reveal frustration with the prevailing options for limiting access to the self by managing email boundaries. We apply our insight to offer design suggestions that could help commercial providers improve the user experience of unsubscribing and provide users more control over the email they receive.&lt;/p&gt;

&lt;!--

tags: curation
acmdl: &quot;https://dl.acm.org/citation.cfm?id=3173677&quot; 
pages: &quot;Paper No. 103&quot;

--&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/conference/unsubscribing-chi/&quot;&gt;Why Johnny Can&apos;t Unsubscribe: Barriers to Stopping Unwanted Email&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on January 18, 2020.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[Wait, Do I Know This Person? Understanding Misdirected Email]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/conference/misdirected-email-chi/" />
  <id>https://emileerader.com/conference/misdirected-email-chi</id>
  <published>2019-01-08T00:00:00+00:00</published>
  <updated>2019-01-08T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;Email is an essential tool for communication and social interaction. It also functions as a broadcast medium connecting businesses with their customers, as an authentication mechanism, and as a vector for scams and security threats. These uses are enabled by the fact that the only barrier to reaching someone by email is knowing his or her email address. This feature has given rise to the spam email industry but also has another side-effect that is becoming increasingly common: misdirected email, or legitimate emails that are intended for somebody else but are sent to the wrong recipient. In this paper we present findings from an interview study and survey focusing on characteristics of misdirected email messages, possible reasons why they happen, and how people manage these messages when they receive them. Misdirected email arises as a result of signifiers (usernames) which were selected by people for social and self-representation purposes, that are also used by machines for addressing. Because there is no mechanism for dealing with misdirected emails in a systematic way, individual recipients must choose whether to take action and how much effort to put forth to prevent potential negative consequences for themselves and others.&lt;/p&gt;


    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/conference/misdirected-email-chi/&quot;&gt;Wait, Do I Know This Person? Understanding Misdirected Email&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on January 08, 2019.&lt;/p&gt;
  </content>
</entry>


<entry>
  <title type="html"><![CDATA[Ontogeny of alkaline phosphatase activity in infant intestines and breast milk]]></title>
  <link rel="alternate" type="text/html" href="https://emileerader.com/journal/bmc-pediatrics/" />
  <id>https://emileerader.com/journal/bmc-pediatrics</id>
  <published>2018-12-20T00:00:00+00:00</published>
  <updated>2018-12-20T00:00:00+00:00</updated>
  <author>
    <name></name>
    <uri>https://emileerader.com</uri>
    
  </author>
  <content type="html">
    &lt;p&gt;Background: Necrotizing enterocolitis (NEC) is a devastating disease of intestinal inflammation that primarily affects
premature infants. A potential risk factor for necrotizing enterocolitis is exposure of the premature neonatal intestine to
environmental bacteria and their proinflammatory products such as lipopolysaccharide. The metalloenzyme alkaline
phosphatase (ALP) has been shown to reduce lipopolysaccharide-mediated inflammation. Additionally, premature rat
pups have reduced alkaline phosphatase activity and expression as compared to full term pups. To explore the
possibility that the human premature neonatal intestine has a paucity of alkaline phosphatase activity, we measured
endogenously produced intestinal alkaline phosphatase activity in meconium as a function of gestational age. To test
whether breast milk could serve as a source of exogenous alkaline phosphatase to the neonatal intestine through
ingestion, we measured alkaline phosphatase activity in breast milk across a range of time points post-birth.&lt;/p&gt;

&lt;p&gt;Methods: Alkaline phosphatase activity was quantified in 122 meconium samples from infants of gestational
ages ranging from 24 to 40 weeks and in 289 breast milk samples collected from 78 individual mothers
between days 2–49 post-birth.&lt;/p&gt;

&lt;p&gt;Results: We observed a strong positive correlation between the meconium alkaline phosphatase activity and
gestational age, with preterm infants having lower meconium alkaline phosphatase activities than early term
or term infants. Breast milk alkaline phosphatase activity was highest in the first week post-birth, with peak
alkaline phosphatase activity at day 2 post-birth, followed by relatively low alkaline phosphatase activity in
weeks 2–7.&lt;/p&gt;

&lt;p&gt;Conclusions: Our results are consistent with the two major risk factors for necrotizing enterocolitis
development, preterm birth and lack of breast milk feeding, both contributing to a paucity of alkaline
phosphatase activity and impaired capacity to detoxify proinflammatory bacterial products such as
lipopolysaccharide.&lt;/p&gt;

&lt;p&gt;Keywords: Necrotizing enterocolitis (NEC), Meconium, LPS detoxification, Gestational age&lt;/p&gt;

    &lt;p&gt;&lt;a href=&quot;https://emileerader.com/journal/bmc-pediatrics/&quot;&gt;Ontogeny of alkaline phosphatase activity in infant intestines and breast milk&lt;/a&gt; was originally published by Emilee Rader at &lt;a href=&quot;https://emileerader.com&quot;&gt;Emilee Rader&lt;/a&gt; on December 20, 2018.&lt;/p&gt;
  </content>
</entry>

</feed>
