Author of the publication

Understanding and capturing people's privacy policies in a mobile social networking application.

, , , , , , and . Personal and Ubiquitous Computing, 13 (6): 401-412 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Focused simulated annealing search: An application to job shop scheduling., and . Ann. Oper. Res., 63 (1): 77-103 (1996)Advances in B2B e-Commerce and E-Supply Chain Management Guest Editors' Introduction., and . J. Organ. Comput. Electron. Commer., 13 (3-4): 163-165 (2003)Agents on the Web: Agent Research and Development in Europe., , and . IEEE Internet Comput., 4 (5): 81-83 (2000)MAPS: Scaling Privacy Compliance Analysis to a Million Apps., , , , , , , and . Proc. Priv. Enhancing Technol., 2019 (3): 66-86 (2019)Editor's introduction to regular section., , , and . Electron. Commer. Res. Appl., 6 (2): 183 (2007)ECRA Volume 6 Number 2.. Electron. Commer. Res. Appl., 6 (2): 125 (2007)A Tale of Two Regulatory Regimes: Creation and Analysis of a Bilingual Privacy Policy Corpus., , , , , , , , , and 4 other author(s). LREC, page 5460-5472. European Language Resources Association, (2022)Question Answering for Privacy Policies: Combining Computational and Legal Perspectives., , , , and . EMNLP/IJCNLP (1), page 4946-4957. Association for Computational Linguistics, (2019)Factoring games to isolate strategic interactions., , , and . AAMAS, page 68. IFAAMAS, (2007)Learning to detect phishing emails., , and . WWW, page 649-656. ACM, (2007)