Author of the publication

An online experiment of privacy authorization dialogues for social applications.

, , and . CSCW, page 261-272. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Optimization Routing Algorithm for Green Communication in Underground Mines., , , , , and . Sensors, 18 (6): 1950 (2018)LS-SVM Based Two Step Commercial Short-Term Load Prediction., and . CSAE, page 7:1-7:6. ACM, (2019)Grand Challenges of Researching Adolescent Online Safety: A Family Systems Approach., , , and . AMCIS, Association for Information Systems, (2013)Argument Detection in Online Discussion: A Theory Based Approach., , , and . AMCIS, Association for Information Systems, (2016)Privacy Considerations in Location-Based Advertising., and . Designing Ubiquitous Information Environments, volume 185 of IFIP, page 71-90. Springer, (2005)Privacy in the Age of Big Data: The Challenges and Opportunities for Privacy Research., , , , , , and . ICIS, Association for Information Systems, (2014)A novel radio map construction method with reduced human efforts for Wi-Fi localisation system., , , , , and . Int. J. Sens. Networks, 31 (2): 99-110 (2019)An investigation of the word-processing software market war in South Korea: A game-theoretic approach., , and . Inf. Manag., 47 (2): 96-101 (2010)Facebook apps and tagging: The trade-off between personal privacy and engaging with friends., , , and . J. Assoc. Inf. Sci. Technol., 66 (9): 1883-1896 (2015)Online auction: the effects of transaction probability and listing price on a seller's decision-making behavior., , and . Electron. Mark., 20 (1): 67-79 (2010)