Author of the publication

Understanding and capturing people's privacy policies in a mobile social networking application.

, , , , , , and . Personal and Ubiquitous Computing, 13 (6): 401-412 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explainability Case Studies., , and . CoRR, (2020)The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing., , , , , , and . SOUPS, ACM, (2009)Interactive design and simulation of tubular supporting structure., , , , , and . Graph. Model., (2015)"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns., , , , , and . USENIX Security Symposium, page 1181-1198. USENIX Association, (2021)Standardizing privacy notices: an online study of the nutrition label approach., , , and . CHI, page 1573-1582. ACM, (2010)Understanding Digital-Safety Experiences of Youth in the U.S., , , , , , and . CHI, page 191:1-191:15. ACM, (2023)Who's viewed you?: the impact of feedback in a mobile location-sharing application., , , , , and . CHI, page 2003-2012. ACM, (2009)Curated city: capturing individual city guides through social curation., , , and . CHI, page 3249-3258. ACM, (2014)Of passwords and people: measuring the effect of password-composition policies., , , , , , , and . CHI, page 2595-2604. ACM, (2011)When are users comfortable sharing locations with advertisers?, , , and . CHI, page 2449-2452. ACM, (2011)