Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (2): 59:1-59:23 (2018)Manipulative tactics are the norm in political emails: Evidence from 300K emails from the 2020 US election cycle., , , , , and . Big Data Soc., 10 (1): 205395172211453 (January 2023)A mixed-methods study of mobile users' data usage practices in South Africa., , and . UbiComp, page 1209-1220. ACM, (2015)"They Keep Coming Back Like Zombies": Improving Software Updating Interfaces., , , , and . SOUPS, page 43-58. USENIX Association, (2016)Nudge me right: Personalizing online security nudges to people's decision-making styles., , , , , and . Comput. Hum. Behav., (2020)Quantifying Users' Beliefs about Software Updates., , , , and . CoRR, (2018)You, Me, and IoT: How Internet-Connected Home Devices Affect Interpersonal Relationships., , , , and . CSCW Companion, page 142-145. ACM, (2019)You, Me, and IoT: How Internet-connected Consumer Devices Affect Interpersonal Relationships., , , , and . ACM Trans. Internet Things, 3 (4): 25:1-25:29 (2022)Targeted and Troublesome: Tracking and Advertising on Children's Websites., , , , , , and . CoRR, (2023)Dark patterns: past, present, and future., , , and . Commun. ACM, 63 (9): 42-47 (2020)