Katie O'Leary
Research Areas
Authored Publications
Sort By
Preview abstract
We worked with over 100 participants in industry on developing machine learning (ML) pipelines. Working alongside ML platform owners, software engineers, devops engineers, and data scientists across industries, we migrated existing ML projects into ones with ML pipelines software systems, Kubeflow Pipelines (KFP) and Tensorflow Extended (TFX). In this workshop paper, we share common problems we observed when migrating existing ML code to an ML pipeline system.
View details
Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy
Tara Matthews
Jill Palzkill Woelfer
Martin Shelton
Andrew Oplinger
Andreas Schou
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
Preview abstract
Addressing digital security and privacy issues can be particularly difficult for users who face challenging circumstances. We performed semi-structured interviews with residents and staff at 4 transitional homeless shelters in the U.S. San Francisco Bay Area (n=15 residents, 3 staff) to explore their digital security and privacy challenges. Based on these interviews, we outline four tough times themes -- challenges experienced by our financially insecure participants that impacted their digital security and privacy -- which included: (1) limited financial resources, (2) limited access to reliable devices and Internet, (3) untrusted relationships, and (4) ongoing stress. We provide examples of how each theme impacts digital security and privacy practices and needs. We then use these themes to provide a framework outlining opportunities for technology creators to better support users facing security and privacy challenges related to financial insecurity.
View details
Privacy and security experiences and practices of survivors of intimate partner abuse
Cori Manthorne
Elizabeth Churchill
Jill Palzkill Woelfer
Martin Shelton
Tara Matthews
IEEE Security & Privacy Magazine (2017)
Preview abstract
Recognizing how intimate partner abuse’s three phases—physical control, escape from abuser, and life apart—affect survivors’ technology use can help technology creators better understand and support this population’s digital security and privacy needs.
View details
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
Tara Matthews
Jill Palzkill Woelfer
Martin Shelton
Cori Manthorne
Elizabeth F. Churchill
CHI '17 Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, New York, NY, USA (2017), pp. 2189-2201
Preview abstract
We present a qualitative study of the digital privacy and security motivations, practices, and challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for organizing survivors' technology practices and challenges into three phases: physical control, escape, and life apart. This three-phase framework combines technology practices with three phases of abuse to provide an empirically sound method for technology creators to consider how survivors of IPA can leverage new and existing technologies. Overall, our results suggest that the usability of and control over privacy and security functions should be or continue to be high priorities for technology creators seeking ways to better support survivors of IPA.
View details
The Moving Context Kit: Designing for Context Shifts in Multi-Device Experiences
Elizabeth Churchill
Jeffrey Nichols
Julia Haines
Michael Gilbert
Proceedings of the 2017 Conference on Designing Interactive Systems, ACM, New York, NY, USA, pp. 309-320
Preview abstract
Multi-device product designers need tools to better address ecologically valid constraints in naturalistic settings early in their design process. To address this need, we created a reusable design kit of scenarios, “hint” cards, and a framework that codifies insights from prior work and our own field study. We named the kit the Moving Context Kit, or McKit for short, because it helps designers focus on context shifts that we found to be highly influential in everyday multi-device use. Specifically, we distilled the following findings from our field study in the McKit: (1) devices are typically specialized into one of six roles during parallel use—notifier, broadcaster, collector, gamer, remote, and hub, and (2) device roles are influenced by context shifts between private and shared situations. Through a workshop, we validated that the McKit enables designers to engage with complex user needs, situations, and relationships when incorporating novel multi-device techniques into the products they envision.
View details