Author of the publication

Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.

, , , , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Where is the Digital Divide?: A Survey of Security, Privacy, and Socioeconomics., , and . CHI, page 931-936. ACM, (2017)The Need for Respectful Technologies: Going Beyond Privacy.. Perspectives on Digital Humanism, (2022)Human Perceptions of Fairness in Algorithmic Decision Making: A Case Study of Criminal Risk Prediction., , , and . WWW, page 903-912. ACM, (2018)"Nudes? Shouldn't I charge for these?": Motivations of New Sexual Content Creators on OnlyFans., , , and . CHI, page 666:1-666:14. ACM, (2023)AMP: authentication of media via provenance., , , , , , , , , and 10 other author(s). MMSys, page 108-121. ACM, (2021)An Inside Look into the Practice of Malware Analysis., , , , , and . CCS, page 3053-3069. ACM, (2021)Leveraging Rights of Data Subjects for Social Media Analysis: Studying TikTok via Data Donations., , , , , , and . CoRR, (2023)Detecting fraud, corruption, and collusion in international development contracts: The design of a proof-of-concept automated system., , , and . IEEE BigData, page 1444-1453. IEEE Computer Society, (2016)SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors., , , , , and . USENIX Security Symposium, USENIX Association, (2024)The Role of Privacy Guarantees in Voluntary Donation of Private Data for Altruistic Goals., , , and . CoRR, (2024)