Author of the publication

An Empirical Study of License Violations in Open Source Projects.

, , , , and . SEW, page 168-176. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantifying Users' Beliefs about Software Updates., , , , and . CoRR, (2018)You, Me, and IoT: How Internet-Connected Home Devices Affect Interpersonal Relationships., , , , and . CSCW Companion, page 142-145. ACM, (2019)You, Me, and IoT: How Internet-connected Consumer Devices Affect Interpersonal Relationships., , , , and . ACM Trans. Internet Things, 3 (4): 25:1-25:29 (2022)Targeted and Troublesome: Tracking and Advertising on Children's Websites., , , , , , and . CoRR, (2023)Dark patterns: past, present, and future., , , and . Commun. ACM, 63 (9): 42-47 (2020)Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines., , , , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)"They Keep Coming Back Like Zombies": Improving Software Updating Interfaces., , , , and . SOUPS, page 43-58. USENIX Association, (2016)A mixed-methods study of mobile users' data usage practices in South Africa., , and . UbiComp, page 1209-1220. ACM, (2015)Manipulative tactics are the norm in political emails: Evidence from 300K emails from the 2020 US election cycle., , , , , and . Big Data Soc., 10 (1): 205395172211453 (January 2023)Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (2): 59:1-59:23 (2018)