nora mcdonald
nora mcdonald
University of Cincinnati
Verifierad e-postadress på
Citeras av
Citeras av
Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice
N McDonald, S Schoenebeck, A Forte
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-23, 2019
Performance and participation in open source software on github
N McDonald, S Goggins
CHI'13 Extended Abstracts on Human Factors in Computing Systems, 139-144, 2013
The politics of privacy theories: Moving from norms to vulnerabilities
N McDonald, A Forte
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
Privacy, anonymity, and perceived risk in open collaboration: A study of service providers
N McDonald, BM Hill, R Greenstadt, A Forte
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
Modeling distributed collaboration on Github
N McDonald, K Blincoe, EVA Petakovic, S Goggins
Advances in Complex Systems 17 (07n08), 1450024, 2014
Qualitative methods for CSCW: Challenges and opportunities
C Fiesler, JR Brubaker, A Forte, S Guha, N McDonald, M Muller
Conference companion publication of the 2019 on computer supported …, 2019
Sifting signal from noise: A new perspective on the meaning of tweets about the “big game”
I Graves, N McDonald, SP Goggins
new media & society 18 (2), 293-312, 2016
The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums
E Tseng, R Bellini, N McDonald, M Danos, R Greenstadt, D McCoy, N Dell, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 1893-1909, 2020
Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations
N McDonald, K Badillo-Urquiola, MG Ames, N Dell, E Keneski, M Sleeper, ...
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020
Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges
N McDonald, A Larsen, A Battisti, G Madjaroff, A Massey, H Mentis
Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 99-110, 2020
Intersectional AI: A Study of How Information Science Students Think about Ethics and Their Impact
N McDonald, S Pan
Proceedings of the ACM on Human-Computer Interaction 4 (CSCW2), 1-19, 2020
A forensic qualitative analysis of contributions to Wikipedia from anonymity seeking users
K Champion, N McDonald, S Bankes, J Zhang, R Greenstadt, A Forte, ...
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-26, 2019
Rethinking the smart closet as an opportunity to enhance the social currency of clothing
JA Rode, R Magee, M Sebastian, A Black, R Yudell, A Gibran, ...
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 183-192, 2012
" So-called privacy breeds evil" Narrative Justifications for Intimate Partner Surveillance in Online Forums
R Bellini, E Tseng, N McDonald, R Greenstadt, D McCoy, T Ristenpart, ...
Proceedings of the ACM on Human-Computer Interaction 4 (CSCW3), 1-27, 2021
Big social data for social and information scientists
SP Goggins, C Mascaro, N McDonald, A Black, G Valetto
iSchools, 2013
Building for ‘We’: Safety Settings for Couples with Memory Concerns
N McDonald, HM Mentis
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
Looking@ position: Examining the location of Twitter handles in a political event
C Mascaro, N McDonald, A Black, SP Goggins
iSchools, 2013
“Citizens Too”: Safety Setting Collaboration Among Older Adults with Memory Concerns
N Mcdonald, HM Mentis
ACM Transactions on Computer-Human Interaction (TOCHI) 28 (5), 1-32, 2021
Distributed Leadership in OSS
N McDonald
Proceedings of the 18th International Conference on Supporting Group Work …, 2014
Does Infrastructure have Gender? Third-order Dilemmas
JA Rode, M Sebastian, R Magee, N McDonald, S Goggins
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20