Author of the publication

Who gets to know what when: configuring privacy permissions in an awareness application.

, and . CHI, page 101-110. ACM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic., , , , , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-27 (2022)Peer-produced privacy protection., , , and . ISTAS, page 147-154. IEEE, (2013)Are you exposed?: conveying information exposure., and . CSCW (Companion), page 191-194. ACM, (2012)Who gets to know what when: configuring privacy permissions in an awareness application., and . CHI, page 101-110. ACM, (2005)Understanding Perceptions of Smart Devices., and . Financial Cryptography Workshops, volume 12063 of Lecture Notes in Computer Science, page 102-121. Springer, (2020)Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice., , , and . SOUPS, page 5. ACM, (2012)How Mandatory Second Factor Affects the Authentication User Experience., and . CHI, page 1-13. ACM, (2020)Give Social Network Users the Privacy They Want., , , and . CSCW, page 1427-1441. ACM, (2015)My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules., , , and . Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, page 86-97. Springer, (2012)Public Disclosure versus Private Practice: Challenges in Business Process Management (Position Paper)., , and . ICSOC/ServiceWave Workshops, volume 6275 of Lecture Notes in Computer Science, page 115-122. (2009)