Author of the publication

Understanding and capturing people's privacy policies in a mobile social networking application.

, , , , , , and . Personal and Ubiquitous Computing, 13 (6): 401-412 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SWAMI: a framework for collaborative filtering algorithm development and evaluation., , , , , and . SIGIR, page 366-368. ACM, (2000)Challenge: ubiquitous location-aware computing and the "place lab" initiative., , , , , , , , and . WMASH, page 29-35. ACM, (2003)Does this App Really Need My Location?: Context-Aware Privacy Management for Smartphones., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (3): 42:1-42:22 (2017)"It's our mutual responsibility to share": The Evolution of Account Sharing in Romantic Couples., , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW1): 160:1-160:27 (2021)Normal and Easy: Account Sharing Practices in the Workplace., , , , and . Proc. ACM Hum. Comput. Interact., 3 (CSCW): 83:1-83:25 (2019)A comparative study of location-sharing privacy preferences in the United States and China., , , , , , and . Pers. Ubiquitous Comput., 17 (4): 697-711 (2013)CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites., , , and . ACM Trans. Inf. Syst. Secur., 14 (2): 21:1-21:28 (2011)Do They Accept or Resist Cybersecurity Measures? Development and Validation of the 13-Item Security Attitude Inventory (SA-13)., , and . CoRR, (2022)Sensor as a Company: On Self-Sustaining IoT Commons., , and . CoRR, (2021)Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption., , and . CoRR, (2022)