Author of the publication

Researchers' big data crisis; understanding design and functionality.

, and . Commun. ACM, 55 (2): 10-11 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SWAMI: a framework for collaborative filtering algorithm development and evaluation., , , , , and . SIGIR, page 366-368. ACM, (2000)Challenge: ubiquitous location-aware computing and the "place lab" initiative., , , , , , , , and . WMASH, page 29-35. ACM, (2003)CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites., , , and . ACM Trans. Inf. Syst. Secur., 14 (2): 21:1-21:28 (2011)A comparative study of location-sharing privacy preferences in the United States and China., , , , , , and . Pers. Ubiquitous Comput., 17 (4): 697-711 (2013)Normal and Easy: Account Sharing Practices in the Workplace., , , , and . Proc. ACM Hum. Comput. Interact., 3 (CSCW): 83:1-83:25 (2019)"It's our mutual responsibility to share": The Evolution of Account Sharing in Romantic Couples., , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW1): 160:1-160:27 (2021)Charting App Developers' Journey Through Privacy Regulation Features in Ad Networks., , , , and . Proc. Priv. Enhancing Technol., 2022 (3): 33-56 (2022)Lean Privacy Review: Collecting Users' Privacy Concerns of Data Practices at a Low Cost., , , , and . ACM Trans. Comput. Hum. Interact., 28 (5): 34:1-34:55 (2021)Alert Now or Never: Understanding and Predicting Notification Preferences of Smartphone Users., , , , and . ACM Trans. Comput. Hum. Interact., 29 (5): 39:1-39:33 (2022)Do They Accept or Resist Cybersecurity Measures? Development and Validation of the 13-Item Security Attitude Inventory (SA-13)., , and . CoRR, (2022)