Jennifer King

Learn More
— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, payment cards, and personal identification cards and documents. While RFID technology has existed for decades, these new applications carry with them substantial new privacy and security risks(More)
This nationally representative telephone (wire-line and cell phone) survey explores Americans' opinions about behavioral targeting by marketers, a controversial issue currently before government policymakers. Behavioral targeting involves two types of activities: following users' actions and then tailoring advertisements for the users based on those(More)
Serotonin (5-hydroxytryptamine or 5-HT) is thought to regulate neurodevelopmental processes through maternal-fetal interactions that have long-term mental health implications. It is thought that beyond fetal 5-HT neurons there are significant maternal contributions to fetal 5-HT during pregnancy but this has not been tested empirically. To examine putative(More)
Media reports teem with stories of young people posting salacious photos online, writing about alcohol-fueled misdeeds on social networking sites, and publicizing other ill-considered escapades that may haunt them in the future. These anecdotes are interpreted as representing a generation-wide shift in attitude toward information privacy. Many commentators(More)
Interest in usable security -- the research, development, and study of systems that are both usable and secure -- has been growing both in the CHI and information security communities in the past several years. Despite this interest, however, the process of designing and conducting security-related user studies remains extremely difficult. Users deal with(More)
While there has been considerable academic work over the past decade on preserving and enhancing digital privacy, little of this scholarship has influenced practitioners in design or industry. By bringing together leading privacy academics and commercial stakeholders, this workshop builds on previous gatherings at ACM conferences and in the broader privacy(More)
The Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 authorized incentive payments to eligible professionals and hospitals for the adoption and meaningful use of certified electronic health record (EHR) technology (1,2). To participate in the Medicare and Medicaid EHR Incentive Programs, professionals are required to(More)
While extant for decades in the industrial sector, radio frequency identification (RFID) technology is increasingly being incorporated into everyday products and objects. This growing ubiquity brings with it security and privacy concerns for end users due to implementations that fail to adequately protect personal or identifiable data stored on RF(More)
Smartphone applications pose interesting security problems because the same resources they use to enhance the user experience may also be used in ways that users might find objectionable. We performed a set of experiments to study whether attribution mechanisms could help users understand how smartphone applications access device resources. First, we(More)