Author of the publication

Who's viewed you?: the impact of feedback in a mobile location-sharing application.

, , , , , and . CHI, page 2003-2012. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Standardizing privacy notices: an online study of the nutrition label approach., , , and . CHI, page 1573-1582. ACM, (2010)Understanding Digital-Safety Experiences of Youth in the U.S., , , , , , and . CHI, page 191:1-191:15. ACM, (2023)Of passwords and people: measuring the effect of password-composition policies., , , , , , , and . CHI, page 2595-2604. ACM, (2011)When are users comfortable sharing locations with advertisers?, , , and . CHI, page 2449-2452. ACM, (2011)Who's viewed you?: the impact of feedback in a mobile location-sharing application., , , , , and . CHI, page 2003-2012. ACM, (2009)Curated city: capturing individual city guides through social curation., , , and . CHI, page 3249-3258. ACM, (2014)Encountering stronger password requirements: user attitudes and behaviors., , , , , , , and . SOUPS, volume 485 of ACM International Conference Proceeding Series, ACM, (2010)Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share., , , , , and . UbiComp, page 197-206. ACM, (2011)Empirical models of privacy in location sharing., , , , , , , , and . UbiComp, page 129-138. ACM, (2010)Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms., , , , , , , , and . IEEE Symposium on Security and Privacy, page 523-537. IEEE Computer Society, (2012)