Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

I know where you live: analyzing privacy protection in public databases., , and . WPES, page 165-170. ACM, (2011)Attitudes toward vehicle-based sensing and recording., , , and . UbiComp, page 1017-1028. ACM, (2015)CHI 2019., , , , , , , and . IEEE Pervasive Comput., 18 (3): 70-76 (2019)Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors., , , , , and . CHI, page 101-112. ACM, (2016)Improving Computer Security Dialogs., , , , and . INTERACT (4), volume 6949 of Lecture Notes in Computer Science, page 18-35. Springer, (2011)The post that wasn't: exploring self-censorship on facebook., , , , , and . CSCW, page 793-802. ACM, (2013)Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It., , , , and . SOUPS, page 105-111. USENIX Association, (2014)Everyday Online Sharing.. Carnegie Mellon University, USA, (2016)Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs., , , , , and . CCS, page 365-377. ACM, (2012)SoK: A Framework for Unifying At-Risk User Research., , , , , , , , , and . CoRR, (2021)