Author of the publication

Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility.

, , , and . CHI, page 525. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study., , , , and . SOUPS @ USENIX Security Symposium, page 597-616. USENIX Association, (2021)A Qualitative Evaluation of Reverse Engineering Tool Usability., , , and . ACSAC, page 619-631. ACM, (2022)User Interactions and Permission Use on Android., , , , , and . CHI, page 362-373. ACM, (2017)The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level., , , , , and . USENIX Security Symposium, page 621-637. USENIX Association, (2018)How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks., , , , , , and . CHI, page 589:1-589:18. ACM, (2022)Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery., , , , , , and . SP, page 1997-2014. IEEE, (2023)Build It, Break It, Fix It: Contesting Secure Development., , , , , , , and . ACM Trans. Priv. Secur., 23 (2): 10:1-10:36 (2020)Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility., , , and . CHI, page 525. ACM, (2019)Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition., , , , , and . CCS, page 1141-1155. ACM, (2022)An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra., , , , and . EuroS&P, page 1-20. IEEE, (2021)