From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Empirical Analysis of Data Breach Litigation., , и . ICIS, Association for Information Systems, (2011)Tweets are forever: a large-scale quantitative analysis of deleted tweets., , , , и . CSCW, стр. 897-908. ACM, (2013)When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information., и . WEIS, (2007)Health Disclosure Laws and Health Information Exchanges., , , , и . WEIS, (2011)Engineering Information Disclosure: Norm Shaping Designs., , , и . CHI, стр. 587-597. ACM, (2016)Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts., , , , , , , и . CHI, стр. 63:1-63:25. ACM, (2021)From Intent to Action: Nudging Users Towards Secure Mobile Payments., , , , , и . SOUPS @ USENIX Security Symposium, стр. 379-415. USENIX Association, (2020)Trust modelling for online transactions: a phishing scenario., , и . PST, том 380 из ACM International Conference Proceeding Series, стр. 11. ACM, (2006)Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences., , , , , и . SOUPS, стр. 1-18. USENIX Association, (2014)Is it the Typeset or the Type of Statistics? Disfluent Font does not Reduce Self-disclosure., , , , и . LASER, стр. 1-11. USENIX Association, (2013)