Anonymity, privacy, and security online L Rainie, S Kiesler, R Kang, M Madden, M Duggan, S Brown, L Dabbish Pew Research Center 5, 2013 | 340 | 2013 |
{“My} Data Just Goes {Everywhere:”} User Mental Models of the Internet and Implications for Privacy and Security R Kang, L Dabbish, N Fruchter, S Kiesler Eleventh Symposium on Usable Privacy and Security (SOUPS 2015), 39-52, 2015 | 312 | 2015 |
Why Do People Seek Anonymity on the Internet? Informing Policy and Design R Kang, S Brown, S Kiesler CHI 2013, 2013 | 183 | 2013 |
Privacy Attitudes of Mechanical Turk Workers and the {US}. Public R Kang, S Brown, L Dabbish, S Kiesler 10th Symposium On Usable Privacy and Security (SOUPS 2014), 37-49, 2014 | 160 | 2014 |
Social transparency in networked information exchange: a theoretical framework HC Stuart, L Dabbish, S Kiesler, P Kinnaird, R Kang Proceedings of the ACM 2012 conference on Computer Supported Cooperative …, 2012 | 122 | 2012 |
Understanding factors affecting perceived sociability of social software Q Gao, Y Dai, Z Fan, R Kang Computers in Human Behavior 26 (6), 1846-1861, 2010 | 114 | 2010 |
Semantic imitation in social tagging WT Fu, T Kannampallil, R Kang, J He ACM Transactions on Computer-Human Interaction (TOCHI) 17 (3), 1-37, 2010 | 106 | 2010 |
Expecting the unexpected: Understanding mismatched privacy expectations online A Rao, F Schaub, N Sadeh, A Acquisti, R Kang Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 77-96, 2016 | 83 | 2016 |
XIA: Architecting a more trustworthy and evolvable Internet D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ... ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014 | 64 | 2014 |
Strangers on your phone: Why people use anonymous communication applications R Kang, L Dabbish, K Sutton Proceedings of the 19th ACM conference on computer-supported cooperative …, 2016 | 63 | 2016 |
Making use of derived personality: The case of social media ad targeting J Chen, E Haber, R Kang, G Hsieh, J Mahmud Ninth International AAAI Conference on Web and Social Media, 2015 | 63 | 2015 |
A semantic imitation model of social tag choices WT Fu, TG Kannampallil, R Kang 2009 international conference on computational science and engineering 4, 66-73, 2009 | 61 | 2009 |
Facilitating exploratory search by model-based navigational cues WT Fu, TG Kannampallil, R Kang Proceedings of the 15th international conference on Intelligent user …, 2010 | 33 | 2010 |
Exploiting knowledge-in-the-head and knowledge-in-the-social-web: Effects of domain expertise on exploratory search in individual and social search environments R Kang, WT Fu, TG Kannampallil Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010 | 31 | 2010 |
Exploratory information search by domain experts and novices R Kang, WT Fu Proceedings of the 15th international conference on Intelligent user …, 2010 | 30 | 2010 |
Teammate inaccuracy blindness: when information sharing tools hinder collaborative analysis R Kang, A Kane, S Kiesler Proceedings of the 17th ACM conference on Computer supported cooperative …, 2014 | 13 | 2014 |
Do collaborators' annotations help or hurt asynchronous analysis R Kang, S Kiesler Proceedings of the ACM 2012 conference on Computer Supported Cooperative …, 2012 | 12 | 2012 |
Conformity out of diversity: Dynamics of information needs and social influence of tags in exploratory information search R Kang, T Kannampallil, J He, WT Fu International Conference on Foundations of Augmented Cognition, 155-164, 2009 | 12 | 2009 |
User perceived quality of online social information services: from the perspective of knowledge management YS Dai, Q Gao, Z Fan, RG Kang 2007 IEEE International Conference on Industrial Engineering and Engineering …, 2007 | 9 | 2007 |
Incognito Online: Why and How People Hide Their Information R Kang unpublished doctoral dissertation, Carnegie Mellon University, 2015 | 2 | 2015 |