Author of the publication

Susceptibility to Social Influence of Privacy Behaviors: Peer versus Authoritative Sources.

, and . CSCW, page 581-593. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Who, when, where: Obfuscation preferences in location-sharing applications (CMU-CyLab-11-013), , , , , , , and . (2011)Locaccino: a privacy-centric location sharing application., , , , , , , and . UbiComp (Adjunct Papers), page 381-382. ACM, (2010)Analyzing use of privacy policy attributes in a location sharing application., , , , , , , and . SOUPS, ACM, (2009)An Exploratory Study of Social Support Systems to Help Older Adults in Managing Mobile Safety., , , and . MobileHCI, page 30:1-30:13. ACM, (2021)Analyzing large-scale human mobility data: a survey of machine learning methods and applications., , , and . Knowl. Inf. Syst., 58 (3): 501-523 (2019)OPCATeam - Collaborative Business Process Modeling with OPM., , and . Business Process Management, volume 3080 of Lecture Notes in Computer Science, page 66-81. Springer, (2004)Generating and Optimizing Graphical User Interfaces for Semantic Service Compositions., , , and . ER, volume 5231 of Lecture Notes in Computer Science, page 528-529. Springer, (2008)How Mass surveillance Crowds Out Installations of COVID-19 Contact Tracing Applications., and . Proc. ACM Hum. Comput. Interact., 7 (CSCW1): 1-26 (April 2023)Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (1): 25:1-25:25 (2022)Detecting interruption events using EEG., , , and . LifeTech, page 33-34. IEEE, (2021)