Ruogu Kang
Ruogu Kang
Research Manager, Facebook
Verified email at fb.com
Title
Cited by
Cited by
Year
Anonymity, privacy, and security online
L Rainie, S Kiesler, R Kang, M Madden, M Duggan, S Brown, L Dabbish
Pew Research Center 5, 2013
3102013
“my data just goes everywhere:” user mental models of the internet and implications for privacy and security
R Kang, L Dabbish, N Fruchter, S Kiesler
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 39-52, 2015
2382015
Why Do People Seek Anonymity on the Internet? Informing Policy and Design
R Kang, S Brown, S Kiesler
CHI 2013, 2013
1542013
Privacy attitudes of mechanical turk workers and the us public
R Kang, S Brown, L Dabbish, S Kiesler
10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 37-49, 2014
1272014
Social transparency in networked information exchange: a theoretical framework
HC Stuart, L Dabbish, S Kiesler, P Kinnaird, R Kang
Proceedings of the ACM 2012 conference on Computer Supported Cooperative …, 2012
1132012
Understanding factors affecting perceived sociability of social software
Q Gao, Y Dai, Z Fan, R Kang
Computers in Human Behavior 26 (6), 1846-1861, 2010
1042010
Semantic imitation in social tagging
WT Fu, T Kannampallil, R Kang, J He
ACM Transactions on Computer-Human Interaction (TOCHI) 17 (3), 1-37, 2010
972010
Expecting the unexpected: Understanding mismatched privacy expectations online
A Rao, F Schaub, N Sadeh, A Acquisti, R Kang
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 77-96, 2016
612016
XIA: Architecting a more trustworthy and evolvable Internet
D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ...
ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014
572014
A semantic imitation model of social tag choices
WT Fu, TG Kannampallil, R Kang
2009 international conference on computational science and engineering 4, 66-73, 2009
552009
Making use of derived personality: The case of social media ad targeting
J Chen, E Haber, R Kang, G Hsieh, J Mahmud
Proceedings of the International AAAI Conference on Web and Social Media 9 (1), 2015
542015
Strangers on your phone: Why people use anonymous communication applications
R Kang, L Dabbish, K Sutton
Proceedings of the 19th ACM conference on computer-supported cooperative …, 2016
502016
Facilitating exploratory search by model-based navigational cues
WT Fu, TG Kannampallil, R Kang
Proceedings of the 15th international conference on Intelligent user …, 2010
302010
Exploratory information search by domain experts and novices
R Kang, WT Fu
Proceedings of the 15th international conference on Intelligent user …, 2010
302010
Exploiting knowledge-in-the-head and knowledge-in-the-social-web: Effects of domain expertise on exploratory search in individual and social search environments
R Kang, WT Fu, TG Kannampallil
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
292010
Teammate inaccuracy blindness: when information sharing tools hinder collaborative analysis
R Kang, A Kane, S Kiesler
Proceedings of the 17th ACM conference on Computer supported cooperative …, 2014
122014
Conformity out of diversity: Dynamics of information needs and social influence of tags in exploratory information search
R Kang, T Kannampallil, J He, WT Fu
International Conference on Foundations of Augmented Cognition, 155-164, 2009
122009
Do collaborators' annotations help or hurt asynchronous analysis
R Kang, S Kiesler
Proceedings of the ACM 2012 conference on Computer Supported Cooperative …, 2012
112012
User perceived quality of online social information services: from the perspective of knowledge management
YS Dai, Q Gao, Z Fan, RG Kang
2007 IEEE International Conference on Industrial Engineering and Engineering …, 2007
92007
Inaccuracy Blindness in Collaboration Persists, even with an Evaluation Prompt
AA Kane, S Kiesler, R Kang
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20