Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A mixed-methods study of mobile users' data usage practices in South Africa., , and . UbiComp, page 1209-1220. ACM, (2015)Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity., , , , and . CoRR, (2018)Nudge me right: Personalizing online security nudges to people's decision-making styles., , , , , and . Comput. Hum. Behav., (2020)"They Keep Coming Back Like Zombies": Improving Software Updating Interfaces., , , , and . SOUPS, page 43-58. USENIX Association, (2016)Dark patterns: past, present, and future., , , and . Commun. ACM, 63 (9): 42-47 (2020)You, Me, and IoT: How Internet-Connected Home Devices Affect Interpersonal Relationships., , , , and . CSCW Companion, page 142-145. ACM, (2019)Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines., , , , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)Identifying and measuring manipulative user interfaces at scale on the web. Princeton University, USA, (2020)Mitigating dataset harms requires stewardship: Lessons from 1000 papers., , and . NeurIPS Datasets and Benchmarks, (2021)Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites., , , , , , and . PACMHCI, 3 (CSCW): 81:1-81:32 (2019)