| 2008 |
| 11 | EE | Tara Whalen,
Elaine G. Toms,
James Blustein:
Information displays for managing shared files.
CHIMIT 2008: 5 |
| 2007 |
| 10 | EE | Tara Whalen,
Carrie Gates:
A Psychological Profile of Defender Personality Traits.
JCP 2(2): 84-93 (2007) |
| 2006 |
| 9 | EE | Tara Whalen,
Diana K. Smetters,
Elizabeth F. Churchill:
User experiences with sharing and access control.
CHI Extended Abstracts 2006: 1517-1522 |
| 8 | EE | Vicki Ha,
Kori M. Inkpen,
Tara Whalen,
Regan L. Mandryk:
Direct Intentions: The Effects of Input Devices on Collaboration around a Tabletop Display.
Tabletop 2006: 177-184 |
| 7 | EE | Tara Whalen,
Carrie Gates:
Defender Personality Traits.
WISI 2006: 85-90 |
| 2005 |
| 6 | EE | Melanie Kellar,
Derek F. Reilly,
Kirstie Hawkey,
Malcolm E. Rodgers,
Bonnie MacKay,
David Dearman,
Vicki Ha,
W. Joseph MacInnes,
Michael N. Nunes,
Karen Parker,
Tara Whalen,
Kori M. Inkpen:
It's a jungle out there: practical considerations for evaluation in the city.
CHI Extended Abstracts 2005: 1533-1536 |
| 5 | EE | Kirstie Hawkey,
Melanie Kellar,
Derek F. Reilly,
Tara Whalen,
Kori M. Inkpen:
The proximity factor: impact of distance on co-located collaboration.
GROUP 2005: 31-40 |
| 4 | EE | Tara Whalen,
Kori M. Inkpen:
Gathering evidence: use of visual security cues in web browsers.
Graphics Interface 2005: 137-144 |
| 2004 |
| 3 | EE | Carrie Gates,
Tara Whalen:
Profiling the defenders.
NSPW 2004: 107-114 |
| 1999 |
| 2 | EE | Damian Bentley,
Gregory G. Rose,
Tara Whalen:
ssmail: Opportunistic Encryption in sendmail.
LISA 1999: 1-8 |
| 1 | EE | Tara Whalen,
James P. Black:
Adaptive Groupware for Wireless Networks.
WMCSA 1999: 20- |