Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Management for Journalism., and . IEEE Data Eng. Bull., 35 (3): 7-15 (2012)Opportunities and Challenges in Data Journalism., and . Computation for Humanity, CRC Press, (2014)A Novel Methodology for Developing Automatic Harassment Classifiers for Twitter., , , , and . WOAH, page 7-15. Association for Computational Linguistics, (2020)Predictive Embeddings for Hate Speech Detection on Twitter., , , and . ALW, page 26-32. Association for Computational Linguistics, (2018)"I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational Technology., , and . USENIX Security Symposium, page 5073-5090. USENIX Association, (2023)Individual versus Organizational Computer Security and Privacy Concerns in Journalism., , and . Proc. Priv. Enhancing Technol., 2016 (4): 418-435 (2016)Dispatch: secure, resilient mobile reporting., , , , , , , , and . SIGCOMM, page 459-460. ACM, (2013)Usable Cryptographic Provenance: A Proactive Complement to Fact-Checking for Mitigating Misinformation., , , , , , , and . ICWSM Workshops, (2022)Weaving a safe web of news., , , , , , , , and . WWW (Companion Volume), page 849-852. International World Wide Web Conferences Steering Committee / ACM, (2013)Transparency, Trust, and Security Needs for the Design of Digital News Authentication Tools., , , , , , , and . Proc. ACM Hum. Comput. Interact., 7 (CSCW1): 1-44 (April 2023)