Author of the publication

Yours, mine and (not) ours: social influences on group information repositories.

. CHI, page 2095-2098. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explanations as Mechanisms for Supporting Algorithmic Transparency., , and . CHI, page 103. ACM, (2018)Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites., , , and . SOUPS, page 175-188. USENIX Association, (2016)Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences., , , and . SOUPS, page 89-104. USENIX Association, (2014)Examining user surprise as a symptom of algorithmic filtering.. Int. J. Hum. Comput. Stud., (2017)The importance of visibility for folk theories of sensor data., and . SOUPS, page 257-270. USENIX Association, (2017)Can People Self-Report Security Accurately?: Agreement Between Self-Report and Behavioral Measures., , and . CHI, page 2228-2232. ACM, (2017)Betrayed by updates: how negative experiences affect future security., , and . CHI, page 2671-2674. ACM, (2014)Testing the technology: playing games with video conferencing., , , , , and . CHI, page 849-852. ACM, (2007)Public bookmarks and private benefits: An analysis of incentives in social computing., and . ASIST, volume 44 of Proceedings of the Association for Information Science and Technology, page 1-13. Wiley, (2007)Understanding User Beliefs About Algorithmic Curation in the Facebook News Feed., and . CHI, page 173-182. ACM, (2015)