Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explanations as Mechanisms for Supporting Algorithmic Transparency., , and . CHI, page 103. ACM, (2018)Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites., , , and . SOUPS, page 175-188. USENIX Association, (2016)Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences., , , and . SOUPS, page 89-104. USENIX Association, (2014)Understanding User Beliefs About Algorithmic Curation in the Facebook News Feed., and . CHI, page 173-182. ACM, (2015)Brick by brick: iterating interventions to bridge the achievement gap with virtual peers., , and . CHI, page 2971-2974. ACM, (2011)Yours, mine and (not) ours: social influences on group information repositories.. CHI, page 2095-2098. ACM, (2009)The gap between producer intentions and consumer behavior in social media., , , and . GROUP, page 249-252. ACM, (2012)Public bookmarks and private benefits: An analysis of incentives in social computing., and . ASIST, volume 44 of Proc. Assoc. Inf. Sci. Technol., page 1-13. Wiley, (2007)Testing the technology: playing games with video conferencing., , , , , and . CHI, page 849-852. ACM, (2007)Betrayed by updates: how negative experiences affect future security., , and . CHI, page 2671-2674. ACM, (2014)