Author of the publication

Taking Data Out of Context to Hyper-Personalize Ads: Crowdworkers' Privacy Perceptions and Decisions to Disclose Private Information.

, , , , , and . CHI, page 1-13. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Styx++: Reliable Data Access and Availability Using a Hybrid Paxos and Chain Replication Protocol., , and . CHI Extended Abstracts, page 323:1-323:7. ACM, (2022)Taking Data Out of Context to Hyper-Personalize Ads: Crowdworkers' Privacy Perceptions and Decisions to Disclose Private Information., , , , , and . CHI, page 1-13. ACM, (2020)Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing., , , , , , , and . ACM Conference on Computer and Communications Security, page 149-166. ACM, (2019)Exploring User Mental Models of End-to-End Encrypted Communication Tools., , , and . FOCI @ USENIX Security Symposium, USENIX Association, (2018)"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment., , , , , and . CHI, page 190:1-190:17. ACM, (2023)Skilled or Gullibleƒ Gender Stereotypes Related to Computer Security and Privacy., , , and . SP, page 2050-2067. IEEE, (2023)What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data., , , , , , , , , and . USENIX Security Symposium, page 145-162. USENIX Association, (2020)A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords., , , , , , , , , and . USENIX Security Symposium, page 5127-5144. USENIX Association, (2023)On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security., , , , , , , , and . SOUPS @ USENIX Security Symposium, page 437-454. USENIX Association, (2021)Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships., , , and . SOUPS @ USENIX Security Symposium, page 447-462. USENIX Association, (2022)