Laura Dabbish’s research while affiliated with Carnegie Mellon University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (59)


Letters from Future Self: Augmenting the Letter-Exchange Exercise with LLM-based Agents to Enhance Young Adults' Career Exploration
  • Preprint

February 2025

·

8 Reads

Hayeon Jeon

·

·

Keyeun Lee

·

[...]

·

Hajin Lim

Young adults often encounter challenges in career exploration. Self-guided interventions, such as the letter-exchange exercise, where participants envision and adopt the perspective of their future selves by exchanging letters with their envisioned future selves, can support career development. However, the broader adoption of such interventions may be limited without structured guidance. To address this, we integrated Large Language Model (LLM)-based agents that simulate participants' future selves into the letter-exchange exercise and evaluated their effectiveness. A one-week experiment (N=36) compared three conditions: (1) participants manually writing replies to themselves from the perspective of their future selves (baseline), (2) future-self agents generating letters to participants, and (3) future-self agents engaging in chat conversations with participants. Results indicated that exchanging letters with future-self agents enhanced participants' engagement during the exercise, while overall benefits of the intervention on future orientation, career self-concept, and psychological support remained comparable across conditions. We discuss design implications for AI-augmented interventions for supporting young adults' career exploration.


Fig. 1. Variety of maker products: Top left: P27's hair accessory; Top middle: P18's 3D printed stickers; Top right: P26's cardboard cuffs; Bottom left: P25's Gemstone; Bottom middle: P28's wire sculptures; Bottom right: P19's Featherwing; Rightmost: P29's guitar tennis rackets
Maker entrepreneur (P) and Intermediaries (I) interviewees. Maker entrepreneur creative goods are in red text, and creative entrepreneur services are in blue.
Maker entrepreneur, creative entrepreneur, and intermediary participants (continued)
Understanding the Challenges of Maker Entrepreneurship
  • Preprint
  • File available

January 2025

·

29 Reads

The maker movement embodies a resurgence in DIY creation, merging physical craftsmanship and arts with digital technology support. However, mere technological skills and creativity are insufficient for economically and psychologically sustainable practice. By illuminating and smoothing the path from ``maker" to ``maker entrepreneur," we can help broaden the viability of making as a livelihood. Our research centers on makers who design, produce, and sell physical goods. In this work, we explore the transition to entrepreneurship for these makers and how technology can facilitate this transition online and offline. We present results from interviews with 20 USA-based maker entrepreneurs {(i.e., lamps, stickers)}, six creative service entrepreneurs {(i.e., photographers, fabrication)}, and seven support personnel (i.e., art curator, incubator director). Our findings reveal that many maker entrepreneurs 1) are makers first and entrepreneurs second; 2) struggle with business logistics and learn business skills as they go; and 3) are motivated by non-monetary values. We discuss training and technology-based design implications and opportunities for addressing challenges in developing economically sustainable businesses around making.

Download

Power and Play: Investigating "License to Critique" in Teams' AI Ethics Discussions

November 2024

·

14 Reads

·

1 Citation

Proceedings of the ACM on Human-Computer Interaction

Past work has sought to design AI ethics interventions--such as checklists or toolkits--to help practitioners design more ethical AI systems. However, other work demonstrates how these interventions may instead serve to limit critique to that addressed within the intervention, while rendering broader concerns illegitimate. In this paper, drawing on work examining how standards enact discursive closure and how power relations affect whether and how people raise critique, we recruit three corporate teams, and one activist team, each with prior context working with one another, to play a game designed to trigger broad discussion around AI ethics. We use this as a point of contrast to trigger reflection on their teams' past discussions, examining factors which may affect their ''license to critique'' in AI ethics discussions. We then report on how particular affordances of this game may influence discussion, and find that the hypothetical context created in the game is unlikely to be a viable mechanism for real world change. We discuss how power dynamics within a group and notions of ''scope'' affect whether people may be willing to raise critique in AI ethics discussions, and discuss our finding that games are unlikely to enable direct changes to products or practice, but may be more likely to allow members to find critically-aligned allies for future collective action.


Paradoxes of Openness: Trans Experiences in Open Source Software

November 2024

·

7 Reads

Proceedings of the ACM on Human-Computer Interaction

In recent years, concerns have increased over the lack of contributor diversity in open source software (OSS), despite its status as a paragon of open collaboration. OSS is an important form of digital infrastructure and part of a career path for many developers. While there exists a growing body of literature on cisgender women's under-representation in OSS, the experiences of contributors from other marginalized groups are comparatively absent from the literature. Such is the case for trans contributors, a historically influential group in OSS. In this study, we interviewed 21 trans participants to understand and represent their experiences in the OSS literature. From their experiences, we theorize two related paradoxes of openness in OSS: the paradox of openness and display and the paradox of openness and governance. In an increasingly violent world for trans people, we draw on our theorizing to build recommendations for more inclusive and safer OSS projects for contributors.




Fig. 1. P3's project website include trans "easter eggs" -trans iconography and a link to the comic that helped crack her egg.
Fig. 2. RealLife Comics excerpt, cited by P3, where the comic author shares the story about their own realization and transition. Permission for use granted by author.
Paradoxes of Openness and Trans Experiences in Open Source Software

September 2024

·

31 Reads

In recent years, concerns have increased over the lack of contributor diversity in open source software (OSS), despite its status as a paragon of open collaboration. OSS is an important form of digital infrastructure and part of a career path for many developers. While there exists a growing body of literature on cisgender women's under-representation in OSS, the experiences of contributors from other marginalized groups are comparatively absent from the literature. Such is the case for trans contributors, a historically influential group in OSS. In this study, we interviewed 21 trans participants to understand and represent their experiences in the OSS literature. From their experiences, we theorize two related paradoxes of openness in OSS: the paradox of openness and display and the paradox of openness and governance. In an increasingly violent world for trans people, we draw on our theorizing to build recommendations for more inclusive and safer OSS projects for contributors.



Figure 2: Illustration of Protection Motivation Theory. Threat appraisal and coping appraisal are the key antecedents of protection motivation; each is the result of a calculation of pros and cons.
Figure 3: The innovation-decision process in Innovation Diffusion Theory. This describes how a person (or other decisionmaking unit) moves through, first, knowledge of an innovation; then, to forming an attitude toward the innovation; next, to a decision to adopt or reject it; and, finally, to implementing the new idea and to confirmation of the decision. Communication influences each stage.
A Framework for Reasoning about Social Influences on Security and Privacy Adoption

May 2024

·

85 Reads

Much research has found that social influences (such as social proof, storytelling, and advice-seeking) help boost security awareness. But we have lacked a systematic approach to tracing how awareness leads to action, and to identifying which social influences can be leveraged at each step. Toward this goal, we develop a framework that synthesizes our design ideation, expertise, prior work, and new interview data into a six-step adoption process. This work contributes a prototype framework that accounts for social influences by step. It adds to what is known in the literature and the SIGCHI community about the social-psychological drivers of security adoption. Future work should establish whether this process is the same regardless of culture, demographic variation, or work vs. home context, and whether it is a reliable theoretical basis and method for designing experiments and focusing efforts where they are likely to be most productive. CCS CONCEPTS • Security and privacy; • Human and societal aspects of security and privacy; Usability in security and privacy; • Human-centered computing; • Human computer interaction (HCI); HCI design and evaluation methods, User studies; HCI theory , concepts and models; Empirical studies in collaborative and social computing;


"Nip it in the Bud": Moderation Strategies in Open Source Software Projects and the Role of Bots

October 2023

·

22 Reads

·

11 Citations

Proceedings of the ACM on Human-Computer Interaction

Much of our modern digital infrastructure relies critically upon open sourced software. The communities responsible for building this cyberinfrastructure require maintenance and moderation, which is often supported by volunteer efforts. Moderation, as a non-technical form of labor, is a necessary but often overlooked task that maintainers undertake to sustain the community around an OSS project. This study examines the various structures and norms that support community moderation, describes the strategies moderators use to mitigate conflicts, and assesses how bots can play a role in assisting these processes. We interviewed 14 practitioners to uncover existing moderation practices and ways that automation can provide assistance. Our main contributions include a characterization of moderated content in OSS projects, moderation techniques, as well as perceptions of and recommendations for improving the automation of moderation tasks. We hope that these findings will inform the implementation of more effective moderation practices in open source communities.


Citations (41)


... For collaboration and ethical reflections, Guttman et al. [20] designed a game-environment test harness to evaluate human-AI decision-making, simulating how AI support systems influence human choices. Widder et al. [41] leveraged a structured game to provoke critical reflections on AI ethics among corporate and activist teams, revealing how power dynamics shape "license to critique" in AI discussions. However, these studies under-explored the ethical implications specifically within the interaction between humans and AIs. ...

Reference:

The Real Her? Exploring Whether Young Adults Accept Human-AI Love
Power and Play: Investigating "License to Critique" in Teams' AI Ethics Discussions

Proceedings of the ACM on Human-Computer Interaction

... To this end, OSS projects have been increasingly deploying a declaration of their code of conduct, which defines ethical rules to ensure a respectful and inclusive participatory environment in the community. Implementing and fostering codes of conduct in OSS projects not only improves community management and behavior [1]- [3], but also establishes a more inclusive and respectful environment for all contributors [4], [5]. ...

"Nip it in the Bud": Moderation Strategies in Open Source Software Projects and the Role of Bots

Proceedings of the ACM on Human-Computer Interaction

... The p5.js community of systematically acts to maintain a diverse and inclusive population of developers and contributors. MYRIAD PEOPLE can serve to further research onboarding practices [17], turnover [18] or gender representations [19] in artistic communities in comparison to other domains. ...

Gender Representation Among Contributors to Open-Source Infrastructure : An Analysis of 20 Package Manager Ecosystems
  • Citing Conference Paper
  • May 2023

... Tahaei et al. [34] show that individual advocates for issues such as security or privacy help to steer their coworkers towards more ethical choices. Widder et al. [35] find that software practitioners have ethical concerns about military, privacy, advertising, surveillance and more, sometimes even questioning the reason why their company exists. ...

It’s about power: What ethical concerns do software engineers have, and what do they (feel they can) do about them?
  • Citing Conference Paper
  • June 2023

... The community has also explored anti-capitalist design frameworks, such as social justice-oriented interaction design [28]. A capital-oriented theory of CHI also leaves out research on Wikipedia (e.g., [95,105]) and open source communities (e.g., [85]). ...

Climate Coach: A Dashboard for Open-Source Maintainers to Overview Community Dynamics
  • Citing Conference Paper
  • April 2023

... Prior HCI researchers have incorporated various technological designs in training systems to support reflective learning [9,23,33,128]. Some of these features include facilitating role-play [33], reviewing recordings [9,128], annotation [9,33], and feedback [33]. ...

Facilitating Counselor Reflective Learning with a Real-time Annotation tool
  • Citing Conference Paper
  • April 2023

... However, they also noted that persistent uncertainties after proactive efforts could lead to fatigue. Other studies on newcomers in permanently remote positions found that they reimagined remote socialization to be fundamentally self-directed learning and relied on their external networks to construct an independent professional identity rather than an organizational identity (Bailey et al. 2015;Blaising and Dabbish 2022). ...

Managing the Transition to Online Freelance Platforms: Self-Directed Socialization
  • Citing Article
  • November 2022

Proceedings of the ACM on Human-Computer Interaction

... A Review of existing literature reveals lack of adequate research on specific strategies adopted by IT Companies working with large fortune global 100 clients (Frluckaj, H. et al., 2022). This study aims to fill this knowledge gap by exploring on the best strategies and practices employed by IT Companies to deliver a successful software project for their large fortune global 100 clients. ...

Gender and Participation in Open Source Software Development
  • Citing Article
  • November 2022

Proceedings of the ACM on Human-Computer Interaction

... Even though Stable Diffusion and its ilk have been available to the public for less than two years, the idea that these models-and the systems they undergird-will inevitably cause harm seems to be already taken for granted. This is a phenomenon that Daniel Chandler (1995) refers to as the "technological imperative" (see also Widder et al., 2022). Chandler writes that "the technological imperative is a common assumption amongst commentators on 'new technologies'. ...

Limits and Possibilities for “Ethical AI” in Open Source: A Study of Deepfakes
  • Citing Conference Paper
  • June 2022

... Such a survey could determine the distribution of the steps in each sample and to test whether participants move closer to long-term adoption after the deployment of the intervention. (See Fish'N'Steps for an example intervention using a similar algorithm for measurement [31] and Faklaris et al. 2022 for messaging and a short survey to measure use of two-step authentication among Amazon Mechanical Turk workers [21].) ...

Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption