Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps., and . Proc. Priv. Enhancing Technol., 2022 (4): 250-273 (2022)Security and Privacy Failures in Popular 2FA Apps., , , and . USENIX Security Symposium, page 2079-2096. USENIX Association, (2023)50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System., , , , , and . USENIX Security Symposium, page 603-620. USENIX Association, (2019)The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study., , , and . WEIS, (2007)Contextualizing Privacy Decisions for Better Prediction (and Protection)., , , , , , , , and . CHI, page 268. ACM, (2018)An Experience Sampling Study of User Reactions to Browser Warnings in the Field., , , , , and . CHI, page 512. ACM, (2018)Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes., , , , , , , , and . SOUPS, page 97-111. USENIX Association, (2016)Android Permissions Remystified: A Field Study on Contextual Integrity., , , , , and . USENIX Security Symposium, page 499-514. USENIX Association, (2015)P3P deployment on websites., , , , and . Electron. Commer. Res. Appl., 7 (3): 274-293 (2008)Crying Wolf: An Empirical Study of SSL Warning Effectiveness., , , , and . USENIX Security Symposium, page 399-416. USENIX Association, (2009)