Author of the publication

A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks.

, , and . APF, volume 8319 of Lecture Notes in Computer Science, page 187-202. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach for aspect-oriented use case modeling., and . EA@ICSE, page 27-34. ACM, (2008)Software Engineering for Privacy in-the-Large., and . ICSE (2), page 947-948. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Do the Privacy Policies Reflect the Privacy Controls on Social Networks?, , and . SocialCom/PASSAT, page 1155-1158. IEEE Computer Society, (2011)Social Networking Privacy: Understanding the Disconnect from Policy to Controls., , and . Computer, 46 (6): 60-67 (2013)Schrödinger's security: opening the box on app developers' security rationale., , , , , , , and . ICSE, page 149-160. ACM, (2020)Privacy Requirements: Present & Future., , and . ICSE-SEIS, page 13-22. IEEE Computer Society, (2017)A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks., , and . APF, volume 8319 of Lecture Notes in Computer Science, page 187-202. Springer, (2012)Modélisation orientée-aspects de systèmes de ligne de produits par des cas d'utilisations., and . L'OBJET, 14 (3): 59-73 (2008)Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy., , , , , , and . AsiaCCS, page 694-707. ACM, (2020)"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making., , , , , and . ACM Trans. Priv. Secur., 24 (1): 5:1-5:29 (2020)