Author of the publication

"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets.

, , , , , , and . CHI, page 3277-3286. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy?. Comput. Networks, 30 (1-7): 751-753 (1998)The post that wasn't: exploring self-censorship on facebook., , , , , and . CSCW, page 793-802. ACM, (2013)Phinding Phish: An Evaluation of Anti-Phishing Toolbars., , , and . NDSS, The Internet Society, (2007)Privacy patterns for online interactions, , , , and . Proceedings of the 2006 conference on Pattern languages of programs, page 1--9. Portland, Oregon, ACM, (2006)You've been warned: an empirical study of the effectiveness of web browser phishing warnings., , and . CHI, page 1065-1074. ACM, (2008)Timing is everything?: the effects of timing and placement of online privacy indicators., , , and . CHI, page 319-328. ACM, (2009)Privacy critics: UI components to safeguard users' privacy., and . CHI Extended Abstracts, page 258-259. ACM, (1999)Usability and Security of Text Passwords on Mobile Devices., , , , , , , , , and . CHI, page 527-539. ACM, (2016)Do Users' Perceptions of Password Security Match Reality?, , , , , and . CHI, page 3748-3760. ACM, (2016)A US-UK Usability Evaluation of Consent Management Platform Cookie Consent Interface Design on Desktop and Mobile., , , , , , , , and . CHI, page 163:1-163:36. ACM, (2023)