Author of the publication

Should users participate in governing social media? Philosophical and technical considerations of democratic social media.

, , and . First Monday, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Young adults and online political participation: search strategies and the role of social media., , and . DG.O, page 302-306. Digital Government Research Center, (2011)Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics., , , , , and . iThings/GreenCom/CPSCom/SmartData, page 1402-1409. IEEE, (2018)Using Conjoint Analysis to Investigate the Value of Interdependent Privacy in Social App Adoption Scenarios., and . ICIS, Association for Information Systems, (2015)FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage., and . GameSec, volume 9996 of Lecture Notes in Computer Science, page 195-214. Springer, (2016)The Differences in Data Sensitivity Perceptions among Private and Workplace Health Apps: A Delphi Study., , , and . PDH, page 21-30. ACM, (2019)Uncertainty, Ambiguity and Privacy., and . WEIS, (2005)An Economic Study of the Effect of Android Platform Fragmentation on Security Updates., , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 119-137. Springer, (2018)Setting the Stage: Towards Principles for Reasonable Image Inferences., and . UMAP (Adjunct Publication), page 301-307. ACM, (2019)Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities., , , and . CoRR, (2019)Sharing Is Caring, or Callous?, and . CANS, volume 10052 of Lecture Notes in Computer Science, page 670-680. (2016)