Jump to Content

Katie O'Leary

Authored Publications
Google Publications
Other Publications
Sort By
  • Title
  • Title, descending
  • Year
  • Year, descending
    Common problems with Creating Machine Learning Pipelines from Existing Code
    Makoto Uchida
    Third Conference on Machine Learning and Systems (MLSys) (2020)
    Preview abstract We worked with over 100 participants in industry on developing machine learning (ML) pipelines. Working alongside ML platform owners, software engineers, devops engineers, and data scientists across industries, we migrated existing ML projects into ones with ML pipelines software systems, Kubeflow Pipelines (KFP) and Tensorflow Extended (TFX). In this workshop paper, we share common problems we observed when migrating existing ML code to an ML pipeline system. View details
    Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy
    Tara Matthews
    Jill Palzkill Woelfer
    Martin Shelton
    Andrew Oplinger
    Andreas Schou
    Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
    Preview abstract Addressing digital security and privacy issues can be particularly difficult for users who face challenging circumstances. We performed semi-structured interviews with residents and staff at 4 transitional homeless shelters in the U.S. San Francisco Bay Area (n=15 residents, 3 staff) to explore their digital security and privacy challenges. Based on these interviews, we outline four tough times themes -- challenges experienced by our financially insecure participants that impacted their digital security and privacy -- which included: (1) limited financial resources, (2) limited access to reliable devices and Internet, (3) untrusted relationships, and (4) ongoing stress. We provide examples of how each theme impacts digital security and privacy practices and needs. We then use these themes to provide a framework outlining opportunities for technology creators to better support users facing security and privacy challenges related to financial insecurity. View details
    The Moving Context Kit: Designing for Context Shifts in Multi-Device Experiences
    Jeffrey Nichols
    Julia Haines
    Michael Gilbert
    Proceedings of the 2017 Conference on Designing Interactive Systems, ACM, New York, NY, USA, pp. 309-320
    Preview abstract Multi-device product designers need tools to better address ecologically valid constraints in naturalistic settings early in their design process. To address this need, we created a reusable design kit of scenarios, “hint” cards, and a framework that codifies insights from prior work and our own field study. We named the kit the Moving Context Kit, or McKit for short, because it helps designers focus on context shifts that we found to be highly influential in everyday multi-device use. Specifically, we distilled the following findings from our field study in the McKit: (1) devices are typically specialized into one of six roles during parallel use—notifier, broadcaster, collector, gamer, remote, and hub, and (2) device roles are influenced by context shifts between private and shared situations. Through a workshop, we validated that the McKit enables designers to engage with complex user needs, situations, and relationships when incorporating novel multi-device techniques into the products they envision. View details
    Stories from survivors: Privacy & security practices when coping with intimate partner abuse
    Tara Matthews
    Jill Palzkill Woelfer
    Martin Shelton
    Cori Manthorne
    CHI '17 Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, New York, NY, USA (2017), pp. 2189-2201
    Preview abstract We present a qualitative study of the digital privacy and security motivations, practices, and challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for organizing survivors' technology practices and challenges into three phases: physical control, escape, and life apart. This three-phase framework combines technology practices with three phases of abuse to provide an empirically sound method for technology creators to consider how survivors of IPA can leverage new and existing technologies. Overall, our results suggest that the usability of and control over privacy and security functions should be or continue to be high priorities for technology creators seeking ways to better support survivors of IPA. View details
    Preview abstract Recognizing how intimate partner abuse’s three phases—physical control, escape from abuser, and life apart—affect survivors’ technology use can help technology creators better understand and support this population’s digital security and privacy needs. View details
    No Results Found