Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Keerthi Thomas is active.

Publication


Featured researches published by Keerthi Thomas.


ubiquitous computing | 2009

From spaces to places: emerging contexts in mobile privacy

Clara Mancini; Keerthi Thomas; Yvonne Rogers; Blaine A. Price; Lukazs Jedrzejczyk; Arosha K. Bandara; Adam N. Joinson; Bashar Nuseibeh

Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We advocate a diversified approach, enabling the cross-interpretation of data from complementary methods. However, mobility imposes a number of limitations on the methods that can be effectively employed. We discuss how we addressed this problem in an empirical study of mobile social networking. We report on how, by combining a variation of experience sampling and contextual interviews, we have started focusing on a notion of context in relation to privacy, which is subjectively defined by emerging socio-cultural knowledge, functions, relations and rules. With reference to Gieryns sociological work, we call this place, as opposed to a notion of context that is objectively defined by physical and factual elements, which we call space. We propose that the former better describes the context for mobile privacy.


international conference on software engineering | 2014

Distilling privacy requirements for mobile applications

Keerthi Thomas; Arosha K. Bandara; Blaine A. Price; Bashar Nuseibeh

As mobile computing applications have become commonplace, it is increasingly important for them to address end-users’ privacy requirements. Privacy requirements depend on a number of contextual socio-cultural factors to which mobility adds another level of contextual variation. However, traditional requirements elicitation methods do not sufficiently account for contextual factors and therefore cannot be used effectively to represent and analyse the privacy requirements of mobile end users. On the other hand, methods that do investigate contextual factors tend to produce data that does not lend itself to the process of requirements extraction. To address this problem we have developed a Privacy Requirements Distillation approach that employs a problem analysis framework to extract and refine privacy requirements for mobile applications from raw data gathered through empirical studies involving end users. Our approach introduces privacy facets that capture patterns of privacy concerns which are matched against the raw data. We demonstrate and evaluate our approach using qualitative data from an empirical study of a mobile social networking application.


symposium on usable privacy and security | 2009

Studying location privacy in mobile applications: 'predator vs. prey' probes

Keerthi Thomas; Clara Mancini; Lukasz Jedrzejczyk; Arosha K. Bandara; Adam N. Joinson; Blaine A. Price; Yvonne Rogers; Bashar Nuseibeh

Studying location privacy in mobile applications: ’predator vs. prey’ probes Conference Item How to cite: Thomas, Keerthi; Mancini, Clara; Jedrzejczyk, Lukasz; Bandara, Arosha K.; Joinson, Adam; Price, Blaine A.; Rogers, Yvonne and Nuseibeh, Bashar (2009). Studying location privacy in mobile applications: ’predator vs. prey’ probes. In: Proceedings of the 5th Symposium on Usable Privacy and Security, 15-17 July 2009, California.


human factors in computing systems | 2010

Contravision: exploring users' reactions to futuristic technology

Clara Mancini; Yvonne Rogers; Arosha K. Bandara; Tony Coe; Lukasz Jedrzejczyk; Adam N. Joinson; Blaine A. Price; Keerthi Thomas; Bashar Nuseibeh


human factors in computing systems | 2011

In the best families: tracking and relationships

Clara Mancini; Yvonne Rogers; Keerthi Thomas; Adam N. Joinson; Blaine A. Price; Arosha K. Bandara; Lukasz Jedrzejczyk; Bashar Nuseibeh


S4SC'14 Proceedings of the Fifth International Conference on Semantics for Smarter Cities - Volume 1280 | 2014

Dealing with diversity in a smart-city datahub

Mathieu d'Aquin; Alessandro Adamou; Enrico Daga; Shuangyan Liu; Keerthi Thomas; Enrico Motta


international semantic web conference | 2013

Modeling and reasoning upon facebook privacy settings

Mathieu d'Aquin; Keerthi Thomas


Archive | 2009

A Multi-Pronged Empirical Approach to Mobile Privacy Investigation

Clara Mancini; Yvonne Rogers; Lucasz Jedrzejczyk; Keerthi Thomas; Adam N. Joinson; Bashar Nuseibeh


international semantic web conference | 2014

OUSocial2: a platform for gathering students' feedback from social media

Keerthi Thomas; Miriam Fernández; Stuart Brown; Harith Alani


knowledge acquisition, modeling and management | 2012

Realizing networks of proactive smart products

Mathieu d'Aquin; Enrico Motta; Andriy Nikolov; Keerthi Thomas

Collaboration


Dive into the Keerthi Thomas's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yvonne Rogers

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge