Tara Whalen's Research Page

Post-Doctoral Research Associate, Carleton University, Ottawa, ON, Canada 

contact: tjwhalen AT gmail DOT com or tawhalen AT connect DOT carleton DOT ca

Research Interests

Usable security (human factors of security); computer and network security; human-computer interaction, particularly computer-supported cooperative work; tabletop computing; privacy; social implications of computing.


Journal Articles

T. Whalen and C. Gates (2007) A Psychological Profile of Defender Personality Traits. Journal of Computers. 2.2: 84-93. April 2007.

Refereed Conference Papers

Whalen, T., Toms, E., and Blustein, J. Information Displays for Managing Shared Files. ACM Symposium on Computer-Human Interaction for the Management of Information Technology (CHIMIT 2008), November 2008. 

Whalen, T., Toms, E., and Blustein, J. (2008) File Sharing and Group Information Management. Workshop on Personal Information Management (PIM 2008), April 2008. 

Whalen, T. and Gates, C. (2006) Defender Personality Traits. Proceedings of the Workshop on Intelligence and Security Informatics, Singapore. April 2006, 85–91.

Whalen, T., Smetters, D. K., and Churchill, E. F. (2006) User experiences with sharing and access control. Extended Abstracts of the ACM Conference on Human Factors in Computing Systems (CHI 2006). April 2006.

Ha, V., Inkpen, K.M, Mandryk, R.L., and Whalen, T. (2006) Direct Intentions: The Effects of Input Devices on Collaboration around a Tabletop Display.  Proceedings of the First IEEE International Workshop on Horizontal Interactive Human-Computer Systems (TableTop2006). Adelaide, South Australia, January 2006.

Hawkey, K., Kellar, M., Reilly, D., Whalen, T., and Inkpen, K.M. (2005) The Proximity Factor: Impact of Distance on Co-located Collaboration. Proceedings of the ACM International Conference on Supporting Group Work (GROUP). Sanibel Island, FL, USA, November 2005, 31–40. 

Inkpen, K.M., Hawkey, K., Kellar, M., Mandryk, R.L., Parker, J.K., Reilly, D., Scott, S.D. and Whalen, T. (2005) Exploring Display Factors that Influence Co-Located Collaboration: Angle, Size, Number, and User Arrangement. Proceedings of HCI International 2005. Las Vegas, USA, July 2005. 

Whalen, T. and Inkpen, K.M. (2005). Gathering evidence: use of visual security cues in web browsers. Proceedings of Graphics Interface 2005. Victoria, British Columbia, May 2005, 137–145.

Gates, C. and Whalen, T. (2004) Profiling the Defenders. Proceedings of the 2004 New Security Paradigms Workshop (NSPW 2004). Nova Scotia, Canada. September 20–23, 2004. 

Massicotte, F., Whalen, T. and Bilodeau, C. (2002) “Network Mapping Tool for Real-Time Security Analysis,” NATO RTO Information System Technology Panel Symposium on Intrusion Detection Systems (RTO-MP-101/IST-033), May 2002. 

Bentley, D., Rose, G., and Whalen, T. (1999) “ssmail: Opportunistic Encryption in sendmail,” Proceedings of the Thirteenth Systems Administration Conference (LISA ’99), November 1999.

T. Whalen and J. P. Black (1999) “Adaptive Groupware for Wireless Networks,” Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA ’99), February 1999.

Workshop Papers

Whalen, T. (2008) Covering Up: Vagueness and Ambiguity in Computer-Mediated Interaction. CHI Workshop on Secrets and Lies in Computer-Mediated Interaction, April 2008.  

Gates, C. and Whalen, T. (2006) Personal Information on the Web: Methodological Challenges and Approaches. CHI Workshop on Privacy and HCI: Methodologies for Studying Privacy Issues, Montreal, Canada. April 23, 2006.

Whalen, T. and Inkpen, K.M. (2004) Techniques for Visual Feedback of Security State. DIMACS Workshop on Usable Privacy and Security Software, Rutgers University, Piscataway, NJ, July 7, 2004.

Invited Talks and Panels

“Who has access to what? Designing for shared file management.” Focus on Research Series, Centre for Management Informatics, Dalhousie University, November 5, 2007.

Panel: “Usable Security: Quo Vadis?” (panel organizer and moderator), 15th Usenix Security Symposium, August 2, 2006.

“Use of Visual Security Cues in Web Browsing.” SOUPS 2006 Security User Studies Workshop, Carnegie Mellon University, July 12, 2006.

Technical Reports and Miscellaneous Publications

T. Whalen and C. Gates (2006) Defender Personality Traits. Technical Report CS-2006-01, Dalhousie University.

C. Gates and T. Whalen (2005) Private Lives: User Attitudes towards Personal Information on the Web. Technical Report CS-2005-06, Dalhousie University.

T. Whalen and C. Gates (2005) Public Perception of Private Information on Search Engines. Technical Report CS-2005-01, Dalhousie University.

Chung, H., Dearman, D., Ha, V., Hawkey, K., Inkpen, I., Kellar, M., MacKay, B., Nunes, M., Parker, K., Reilly, D., Rodgers, M., and Whalen, T. (2004) Shared Annotations for Collaboration on Handheld Computers. Talk Session. Extended Abstracts of Dalhousie Computer Science In-House Conference. pp. 47–48.

V. Ha and T. Whalen (2004) Awareness of Intent: Collaborating on Tabletop Displays using Direct and Indirect Input Methods. Poster Session. Extended Abstracts of Dalhousie Computer Science In-House Conference. pp. 
23–24. (Winner of Best Poster Award)

M. Kellar, K. M. Inkpen, D. Dearman, K. Hawkey, V. Ha, J. MacInnes, B. Mackay, M. Nunes, K. Parker, D. Reilly, M. Rodgers and T. Whalen (2004) Evaluation of Mobile Collaboration: Learning from our Mistakes. Technical Report CS-2004-13, Dalhousie University.

T. Whalen, V. Ha, K.M. Inkpen, R.L. Mandryk, S. D. Scott and M.S. Hancock (2004) Direct Intentions: The Effects of Input Devices on Collaboration around a Tabletop Display. Technical Report CS-2004-17, Dalhousie University.