Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Law Infringements in Social Live Streaming Services., , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 567-585. Springer, (2017)Inter-Generational Comparison of Social Media Use: Investigating the Online Behavior of Different Generational Cohorts., , , and . HICSS, page 3829-3838. IEEE Computer Society, (2016)How to Convince the Crowd: An Impression Management Approach., , and . HICSS, page 3505-3514. IEEE Computer Society, (2016)Breaking News Commentary: Users' Reactions to Terrorist Attacks in English-Speaking Twittersphere., and . HCI (29), volume 713 of Communications in Computer and Information Science, page 428-434. Springer, (2017)Inter-country Differences in Breaking News Coverage via Microblogging: Reporting on Terrorist Attacks in Europe from the USA, Germany and UK., and . HCI (12), volume 10282 of Lecture Notes in Computer Science, page 317-336. Springer, (2017)Monopolies on Social Network Services (SNS) Markets and Competition Law., , and . ISI, volume 66 of Schriften zur Informationswissenschaft, page 424-436. Verlag Werner Hülsbusch, (2015)Opportunities and challenges of self-tracking technologies: Understanding information, technology, and users through the lens of information science., , , and . ASIST, volume 57 of Proc. Assoc. Inf. Sci. Technol., Wiley, (2020)Privacy Protecting Fitness Trackers: An Oxymoron or Soon to Be Reality?, and . HCI (13), volume 10913 of Lecture Notes in Computer Science, page 431-444. Springer, (2018)"Can I pin this?" The legal position of Pinterest and its users: An analysis of Pinterest's data storage policies and users' trust in the service., , and . First Monday, (2021)The Faceless Vicinity: Who Uses Location-Based Anonymous Social Networks Like Jodel and Why?, , , , and . HCI (13), volume 12774 of Lecture Notes in Computer Science, page 54-73. Springer, (2021)