Author of the publication

Bridging the Gap between Privacy by Design and Privacy in Practice.

, , , , , , , and . CHI Extended Abstracts, page 3415-3422. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profiling the defenders., and . NSPW, page 107-114. ACM, (2004)User Study, Analysis, and Usable Security of Passwords Based on Digital Objects., , , and . IEEE Trans. Inf. Forensics Secur., 6 (3-2): 970-979 (2011)Might I Get Pwned: A Second Generation Compromised Credential Checking Service., , , , , , , , and . USENIX Security Symposium, page 1831-1848. USENIX Association, (2022)Direct Intentions: The Effects of Input Devices on Collaboration around a Tabletop Display., , , and . Tabletop, page 177-184. IEEE Computer Society, (2006)Adaptive Groupware for Wireless Networks., and . WMCSA, page 20-. IEEE Computer Society, (1999)Watchdog or Guardian? Unpacking the Issues Surrounding the Monitoring of InfoSec Employees., and . HAISA, page 25-35. University of Plymouth, (2009)Information displays for managing shared files., , and . CHIMIT, page 5. ACM, (2008)Defender Personality Traits., and . WISI, volume 3917 of Lecture Notes in Computer Science, page 85-90. Springer, (2006)Gathering evidence: use of visual security cues in web browsers., and . Graphics Interface, page 137-144. Canadian Human-Computer Communications Society, (2005)Bridging the Gap between Privacy by Design and Privacy in Practice., , , , , , , and . CHI Extended Abstracts, page 3415-3422. ACM, (2016)