From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Case Study-based Cybersecurity Ethics Curriculum., , , , и . ASE @ USENIX Security Symposium, USENIX Association, (2018)Cloud Standards in Comparison: Are New Security Frameworks Improving Cloud Security?, , , , , и . CLOUD, стр. 50-57. IEEE Computer Society, (2017)An Examination of Dispositional Trust in Human and Autonomous System Interactions., и . HCI (3), том 12183 из Lecture Notes in Computer Science, стр. 420-435. Springer, (2020)An Analysis of Mobile Gaming Apps' Privacy Policies., , , и . GEM, стр. 1-6. IEEE, (2022)Privacy and Security of Cardiovascular Implantable Electronic Devices: Applying a Contextual Integrity Analysis., и . AHFE (6), том 590 из Advances in Intelligent Systems and Computing, стр. 569-580. Springer, (2017)What Motivates People to Use Bitcoin?, , и . SocInfo (2), том 10047 из Lecture Notes in Computer Science, стр. 347-367. (2016)Effects of Self-avatar Similarity on User Trusting Behavior in Virtual Reality Environment., и . HCI (47), том 1836 из Communications in Computer and Information Science, стр. 313-316. Springer, (2023)Evaluating User Behavior in Smartphone Security: A Psychometric Perspective., , , , , и . SOUPS, стр. 509-524. USENIX Association, (2023)Self-Efficacy in Cybersecurity Tasks and Its Relationship with Cybersecurity Competition and Work-Related Outcomes., , и . ASE @ USENIX Security Symposium, USENIX Association, (2016)Privacy considerations when predicting mental health using social media., и . ASIST, том 57 из Proc. Assoc. Inf. Sci. Technol., Wiley, (2020)