Sameer Patil

Sameer Patil
University of Utah | UOU · School of Computing

Doctor of Philosophy

About

73
Publications
11,728
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,124
Citations
Citations since 2016
28 Research Items
712 Citations
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200

Publications

Publications (73)
Article
Misinformation has developed into a critical societal threat that can lead to disastrous societal consequences. Although fact-checking plays a key role in combating misinformation, relatively little research has empirically investigated work practices of professional fact-checkers. To address this gap, we conducted semi-structured interviews with 2...
Article
Nearly all software built today impinges upon end-user privacy and needs to comply with relevant regulations. Therefore, there have been increasing calls for integrating considerations of compliance with privacy regulations throughout the software engineering lifecycle. However, software engineers are typically trained in the technical fields and l...
Article
The ever increasing amount of data on people's smartphones often contains private information of others that people interact with via the device. As a result, one user's decisions regarding app permissions can expose the information of other users. However, research typically focuses on consequences of privacy-related decisions only for the user wh...
Article
Full-text available
Background: Smartphone-based apps designed and deployed to mitigate the COVID-19 pandemic may become an infrastructure for post-pandemic public health surveillance in the United States. Through the lenses of privacy concerns and user expectations of digital pandemic-mitigation techniques, we identify possible long-term sociotechnical implications...
Article
Full-text available
Psychology researchers have long attempted to identify educational practices that improve student learning. However, experimental research on these practices is often conducted in laboratory contexts or in a single course, which threatens the external validity of the results. In this article, we establish an experimental paradigm for evaluating the...
Preprint
BACKGROUND Smartphone-based apps designed and deployed to mitigate the ongoing COVID-19 pandemic are poised to become an infrastructure for post-pandemic public health surveillance. Yet people frequently identify deep-seated privacy concerns about such apps, invoking rationalizations such as contributing to ‘the greater good’ to justify their priva...
Article
In recent years, the use and importance of visual communication through photos have grown considerably. However, we have little understanding of the alignment between the intentions of the photo posters and the reactions of viewers. To address this gap, we replicated previous work that studied the alignment of poster and outsider judgments of text...
Article
We designed and developed Fakey, a game to improve news literacy and reduce misinformation spread by emulating a social media feed. We analyzed player interactions with articles in the feed collected over 19 months within a real-world deployment of the game. We found that Fakey is effective in priming players to be suspicious of articles from quest...
Preprint
Full-text available
Psychology researchers have long attempted to identify educational practices that improve student learning. However, experimental research on these practices is often conducted in laboratory contexts or in a single course, threatening the external validity of the results. In this paper, we establish an experimental paradigm for evaluating the benef...
Chapter
We explored perceptions regarding the value and sensitivity of the data collected by a variety of everyday smart devices. Via semi-structured interviews, we found that people’s conceptualizations of operational details and privacy and security threats of “smart” functions are greatly limited. Our findings point to the need for designs that readily...
Article
Full-text available
News feeds in virtually all social media platforms include engagement metrics, such as the number of times each post is liked and shared. We find that exposure to these signals increases the vulnerability of users to low-credibility information in a simulated social media feed. This finding has important implications for the design of social media in...
Preprint
Full-text available
News feeds in virtually all social media platforms include engagement metrics, such as the number of times each post is liked and shared. We find that exposure to these social engagement signals increases the vulnerability of users to misinformation. This finding has important implications for the design of social media interactions in the misinfor...
Article
Full-text available
Smartphone location sharing is a particularly sensitive type of information disclosure that has implications for users’ digital privacy and security as well as their physical safety. To understand and predict location disclosure behavior, we developed an Android app that scraped metadata from users’ phones, asked them to grant the location-sharing...
Conference Paper
Full-text available
Researchers have recognized the need to pay attention to negative aspects and non-use of social media services to uncover usage barriers and surface shortcomings of these systems. We contribute to these efforts by analyzing comments on posts related to Facebook on two blogs with a technically savvy readership: Slashdot and Schneier on Security. Our...
Conference Paper
When studying technologies pertaining to health, wellness, accessibility, and aging, researchers are often required to perform a balancing act between controlling and sharing sensitive data of the people in their studies and protecting the privacy of these participants. If the data can be anonymized and shared, it can boost the impact of the resear...
Article
Full-text available
Smart Meters are a key component of increasing the power efficiency of the Smart Grid. To help manage the grid effectively, these meters are designed to collect information on power consumption and send it to third parties. With Smart Metering, for the first time, these cloud-connected sensing devices are legally mandated to be installed in the hom...
Conference Paper
The strength of an anonymity system depends on the number of users. Therefore, User eXperience (UX) and usability of these systems is of critical importance for boosting adoption and use. To this end, we carried out a study with 19 non-expert participants to investigate how users experience routine Web browsing via the Tor Browser, focusing particu...
Poster
Sociotechnical researchers have recently begun studying people with rare diseases. There is potential for impact if data can be anonymized and shared so additional research can take place. However, this data also presents a high risk of re-identification because of the rarity of the diseases. Using existing research on data protection techniques, w...
Conference Paper
Digital information is an important corporate asset. Organizations typically devise policies and guidelines to help employees protect the security of such information. Complying with these rules can often be confusing and difficult and may obstruct the task at hand, leading employees to circumvent or ignore policies. Commercial technology and train...
Conference Paper
Full-text available
Digital information is an important asset in the corporate world. Organizations typically devise policies and guidelines to help employees protect the security of such information. Complying with these policies can often be confusing and difficult and may obstruct the task at hand, thus potentially leading employees to circumvent or ignore these po...
Article
Full-text available
As social network sites grow and diversify in both users and content, tensions between users’ audience composition and their disclosure practices become more prevalent. Users must navigate these spaces carefully to reap relational benefits while ensuring content is not shared with unintended audiences. Through a qualitative study of highly engaged...
Conference Paper
Full-text available
Feedback about privacy-affecting system operations is impor- tant for informed end-user privacy management. While feed- back is most relevant if provided immediately, such delivery interrupts the user and risks disrupting ongoing tasks. The timing, volume, and nature of feedback is therefore critical for avoiding inopportune interruption. We varied...
Conference Paper
Full-text available
Social Network Sites (SNS) are often characterized as a trade- off where users must give up privacy to gain social benefits. We investigated the alternative viewpoint that users gain the most benefits when SNSs give them the privacy they desire. Applying structural equation modeling to questionnaire data of 303 Facebook users, we examined the compl...
Conference Paper
Prior research has reported contradictory findings on the rela-tionship between the use of Social Network Sites (SNS) andpsychological well-being. We addressed this shortcoming byincorporating a finer measure of SNS user engagement andhypothesizing a U-shaped rather than purely linear relation-ship between the two. We tested our hypotheses via a Webb...
Article
Owing to the ever-expanding size of social and professional networks, it is becoming cumbersome for individuals to configure information disclosure settings. We used location sharing systems to unpack the nature of discrepancies between a person's disclosure settings and contextual choices. We conducted an experience sampling study (N = 35) to exam...
Conference Paper
Full-text available
Privacy risks have been addressed through technical solutions such as Privacy-Enhancing Technologies (PETs) as well as regulatory measures including Do Not Track. These approaches are inherently limited as they are grounded in the paradigm of a rational end user who can determine, articulate, and manage consistent privacy preferences. This assumes...
Article
Full-text available
Instant Messaging (IM) has evolved into an important tool for collaborative work that supports informal near-synchronous communication and fosters awareness of the online presence of one's communication partners. Like all awareness systems, IM runs into concerns regarding privacy. Drawing upon prior literature and exploratory interviews, we postula...
Conference Paper
Systems of interpersonal interaction typically allow a user to manage privacy by specifying which accesses to his or her personal information are permitted. However, users rarely know whether, when, and by whom information was actually accessed within the parameters they specified. We define actual accesses to personal information as "information e...
Conference Paper
Full-text available
Privacy aspects in technology-mediated interpersonal interaction exhibit complex influence of a large number of diverse factors. Therefore, it is difficult and complicated to isolate the effects of each individual factor across a collection of individual studies. This issue is exacerbated by the rapid pace of technological changes and the influence...
Article
Replication of prior results has recently attracted attention and interest from the CHI community. This paper focuses on the challenges and issues faced in carrying out meaningful and valid replications of HCI studies. I attribute these challenges to two main underlying factors: (i) a domain of inquiry that simultaneously covers people, social syst...
Conference Paper
Full-text available
INTRODUCTION: Choosing where to live is an important health decision facing all. The difficulty involved in this decision-making process motivated us to design the HealthyState app. OBJETIVE: To help people make informed decisions based on how health conditions vary across 50 US states. METHODS: HealthyState transforms publicly available statistica...
Article
Full-text available
Rapid growth in the usage of location-aware mobile phones has enabled mainstream adoption of location-sharing services (LSS). Integration with social-networking services (SNS) has further accelerated this trend. To uncover how these developments have shaped the evolution of LSS usage, we conducted an online study (N = 362) aimed at understanding th...
Article
Full-text available
Rapid growth in the usage of location-aware mobile phones has enabled Location Sharing Services (LSS) to gain mainstream adoption. Integration with social networking services has further accelerated LSS usage. We conducted an online study (N = 401) to uncover the impact of recent changes in the underlying social and technological landscape on the p...
Conference Paper
Full-text available
The increasing inclusion of location and other contextual information in social media applications requires users to be more aware of what their location disclosures reveal. As such, it is important to consider whether existing access-control mechanisms for managing location sharing meet the needs of today's users. We report on a questionnaire (N=1...
Conference Paper
We explore the design space of interfaces for conveying and managing 'exposure' - the actual access to information by parties authorized to access it. Our goal is to convey the resulting disclosure in a quickly interpretable form and to enable lightweight interactions to manage exposure, if needed. Toward this end, we propose mapping levels of expo...
Conference Paper
Full-text available
A malicious person could access a wealth of one's personal information by being one's 'friend' on a social networking site. The goal of this research is to understand the extent to which users are vulnerable to this tactic. Our experiment examined responses of users of a social networking site to a friendship request from a total stranger. Prelimin...
Conference Paper
Full-text available
I was introduced to qualitative methods during the begin- ning stages of my doctoral studies via a formal course on qualitative research methods as well as an extensive read- ing list covering various qualitative techniques and interpre- tive perspectives. Subsequently, I have applied the knowl- edge and insights by incorporating qualitative method...
Article
Context We describe the methodology of a field study of a globally distributed software development project in a multinational corporation. The project spanned four sites in the US and one in India, and is a representative example of the complexities and intricacies of global corporate software development. Objective Our goal is to provide the rat...
Conference Paper
Full-text available
Recent privacy controversies surrounding social networking sites demonstrate that the mere availability of settings is not enough for effective privacy management. We investigated whether the aggregated privacy choices of one's social circle might guide users in making informed privacy decisions. We conducted an experiment in which users specified...
Article
Full-text available
Privacy is a thorny issue that affects all information systems designed for interpersonal interaction and awareness. Theoretical insights regarding privacy and user experience in a variety of systems have produced numerous design principles and guidelines for building systems sensitive to privacy issues. In order to truly improve support for privac...
Article
Full-text available
Enterprises are increasingly deploying social computing platforms, such as blogs, shared bookmarks, and social networks, to support the interper- sonal interactions and knowledge work practices of their employees. These tech- nologies hold great promise for supporting distributed collaboration by enabling greater communication and fostering awarene...
Article
Instant Messaging (IM) is a useful tool for collaborative work. However, the awareness and communication features of IM pose a tension with privacy desires. Inadequate support for managing privacy could lead to suboptimal use of IM and thereby undermine its benefits. We conducted interviews and an Internet survey to understand privacy attitudes and...
Conference Paper
Full-text available
This paper reports on experiences in transitioning a capstone course from a single-quarter to three-quarters. A single-quarter project course in software design and development had been offered by our department for over twenty years. More recently, upon formation of a new undergraduate degree in Informatics, this course was transformed into a thre...
Conference Paper
Full-text available
To understand how collaborators reconcile the often conflicting needs of awareness and privacy, we studied a large software development project in a multinational corporation involving individuals at sites in the U.S. and India. We present a theoretical framework describing privacy management practices and their determinants that emerged from field...
Chapter
Full-text available
The earlier chapters of this book presented a conceptual understanding of awareness (Eggen and van Mensvoort, 2009, in this volume; Metaxas and Markopoulos, 2009, in this volume). A historical account (Rittenbruch and McEwan, 2009, in this volume) as well as descriptions of various implementations (see Part III) illustrate how various systems have...
Conference Paper
Full-text available
This paper explores the gap between actual work practices and their articulation. Our goal is to bring this gap to the forefront as an important consideration for operational process modeling. Business process models presuppose accurate disclosure of employee work practices. However, the presence of a gap between personal practices and their public...
Article
Full-text available
We compared privacy attitudes of knowledge workers from the U.S. and India who were involved in a collaborative soft-ware development project distributed across five sites of a multinational corporation. Prior studies on consumer pri-vacy suggest that privacy concerns in India are lower than those in the U.S. While our work largely confirmed these...
Article
Full-text available
We propose a roundtable discussion to report results of the first UC Information Studies Lab workshop and discuss implications with a broader audience. The workshop is conceived and organized by doctoral students for doctoral students from the three "iSchools" in the University of California system: UC Berkeley's School of Information, UC Irvine's...
Conference Paper
Full-text available
This workshop aims to reflect on methodologies to empirically study privacy issues related to advanced technology. The goal is to address methodological concerns by drawing upon both theoretical perspectives as well as practical experiences.
Conference Paper
Full-text available
We present a lightweight tool to compare the relevance ranking provided by a search engine to the relevance as actually judged by the user performing the query. Using the tool, we conducted a user study with two different versions of the search engine for a large corporate web site with more than 1.8 million pages, and with the popular search engi...
Conference Paper
Full-text available
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information and instant messaging (IM) activity within an application called mySpace. MySpace is an interactive visualization of the physical workplace that provides dynamic informati...
Conference Paper
Full-text available
We present an analysis of privacy attitudes and practices in Instant Messaging based on responses to an online questionnaire. On a 7-point Likert scale, the reported concern about IM privacy spanned the whole range, with the average being slightly below "medium". Respondents' justifications for privacy concerns revealed that the main contributing f...
Article
Full-text available
Designers and researchers of awareness systems have recognized and acknowledged the existence of privacy concerns in systems covering a wide variety of domains (e. g. email [e. g., 1], media spaces [e. g., 7], data mining [e. g. 18], homes with advanced domestic technologies [e. g., 8] and so on). Several factors contribute to making dealing with p...
Article
Full-text available
The great promise of collaborative technologies that improve group awareness and communication is often overshadowed by accompanying privacy concerns. In such systems, the privacy concerns relate to the individuals one interacts with – colleagues, superiors, subordinates, friends and family. Using Instant Messaging as an example, we illustrate that...
Conference Paper
Full-text available
Awareness of activities, routines, tasks, and availability of colleagues is impoverished when collaborative activities are loosely-coupled. Systems built to mitigate this concern by promoting greater awareness amongst collaborators need to address an inherent tension with desires for privacy. My dissertation research explores how awareness systems...
Article
Full-text available
We conducted in-depth interviews with experienced users of Instant Messaging (IM) systems, focusing on privacy issues. We found that IM users share three main privacy concerns: privacy from non-contacts, privacy regarding availability, and privacy regarding the content of IM communication. One important driving force behind an individual's desire f...
Article
Increasingly, software development teams comprise members who are geographically distributed across buildings, cities, countries or even continents. In order to raise the efficiency and effectiveness of such collaboration, team members need timely and context-specific information about the various activities of the other members. This information c...
Conference Paper
Full-text available
Increasingly, software development teams comprise members who are geographically distributed across buildings, cities, countries or even continents. In order to raise the efficiency and effectiveness of such collaboration, team members need timely and context-specific information about the various activities of the other members. This information c...
Article
Full-text available
Awareness of the activities of one’s co-workers is valuable for effective collaboration. The need for awareness is however frequently in conflict with privacy concerns of the people involved. This paper discusses various factors and principles that influence and inform a privacy-preserving design of awareness systems. The Challenges in Preserving P...
Article
Full-text available
As we enable everyday environments with ubiquitous technology, there are many opportunities to support simple activities in useful ways. We are investigating how an environment made aware of the location and activities of its occupants can better support direct human-human communication. Specifically, we have instrumented a home to explore lightwei...
Article
Full-text available
Technical requirements: -1 projector -1 screen for projecting -1 set of computer speakers -4 flipcharts and 10 markers (preferably of different colors).
Article
Full-text available
Awareness of the activities of one's collaborators is crucial for effective and efficient collaboration. In loosely coupled collaborations, particularly those distributed across time and distance, such awareness is impoverished. Interpersonal Awareness and Interactions Systems (IAIS) aim to foster awareness and overcome the impoverishment. Promotin...
Article
In this paper, we suggest that the primary concern regarding privacy in collaborative work settings is "impression management". We discuss a host of factors which influence privacy management in such settings. Finally, we offer some suggestions regarding how designers can empower users to manage their impression.

Network

Cited By