Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Evaluation of Identity-Sharing Behavior in Social Network Communities.. iDMAa Journal, (2006)Selection and context scoping for digital video collections: an investigation of youtube and blogs., , , , , and . JCDL, page 211-220. ACM, (2008)Friends only: examining a privacy-enhancing behavior in facebook., and . CHI, page 1553-1562. ACM, (2010)Effects of structure and interaction style on distinct search tasks., , , , and . JCDL, page 442-451. ACM, (2007)Privacy in Interaction: Exploring Disclosure and Social Capital in Facebook., , , , and . ICWSM, The AAAI Press, (2012)Boundary regulation in social media., and . CSCW, page 769-778. ACM, (2012)Obscurity by Design, and . Washington Law Review, (2013)Lyceum: A Blogsphere for Library Reference, and . University of North Carolina at Chapel Hill, School of Information and Library Science, Chapel Hill, NC, (2004)Factors mediating disclosure in social network sites., , and . Comput. Hum. Behav., 27 (1): 590-598 (2011)Security Issues and Recommendations for Online Social Networks, , , , , , , , , and 1 other author(s). ENISA Position Paper, (October 2007)List of threats & recommendations for SNS.