Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending against device theft with human notarization., , , and . CollaborateCom, page 8-17. ICST / IEEE, (2014)Would You Slack That?: The Impact of Security and Privacy on Cooperative Newsroom Work., , and . PACMHCI, 1 (CSCW): 75:1-75:22 (2017)Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms., , , , , , and . CHI, page 367. ACM, (2019)Understanding the wearability of head-mounted devices from a human-centered perspective., and . ISWC, page 83-86. ACM, (2014)Audience visualization influences disclosures in online social networks., , and . CHI Extended Abstracts, page 1663-1668. ACM, (2011)Investigating contextual cues as indicators for EMA delivery., , , , and . UbiComp/ISWC Adjunct, page 935-940. ACM, (2017)Auracle: Detecting Eating Episodes with an Ear-mounted Sensor., , , , , , , , , and 3 other author(s). Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (3): 92:1-92:27 (2018)The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults, , and . Proceedings of the seventh annual ACM/IEEE international conference on Human-Robot Interaction - HRI \textquotesingle12, ACM Press, (2012)The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults., , and . HRI, page 343-350. ACM, (2012)Reconciling privacy with social media., , , , and . CSCW (Companion), page 19-20. ACM, (2012)