Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Attitudes Regarding a User-Adaptive eCommerce Web Site, , , , and . User Modeling and User-Adapted Interaction, 13 (4): 373--396 (Nov 1, 2003)Why HCI research in privacy and security is critical now., , and . Int. J. Hum. Comput. Stud., 63 (1-2): 1-4 (2005)Usability Challenges in Security and Privacy Policy-Authoring Interfaces., , , and . INTERACT (2), volume 4663 of Lecture Notes in Computer Science, page 141-155. Springer, (2007)Policy framework for security and privacy management., , , , , , , , , and 1 other author(s). IBM J. Res. Dev., 53 (2): 4 (2009)Privacy and Security and Trust, , and . The Human Computer Interaction Handbook, chapter 29, CRC Press, Boca Raton, FL, 3 edition, (2012)Usable privacy and security for personal information management., , and . Commun. ACM, 49 (1): 56-57 (2006)An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench., , and . SOUPS, volume 149 of ACM International Conference Proceeding Series, page 8-19. ACM, (2006)Privacy in information technology: Designing to enable privacy policy management in organizations., , , and . Int. J. Hum. Comput. Stud., 63 (1-2): 153-174 (2005)Analysis of privacy and security policies., , , , , , , , , and 2 other author(s). IBM J. Res. Dev., 53 (2): 3 (2009)Creating an E-Commerce Environment Where Consumers Are Willing to Share Personal Information., , and . Designing Personalized User Experiences in eCommerce, volume 5 of Human-Computer Interaction Series, Kluwer, (2004)