Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of end user security behaviors., , , and . Comput. Secur., 24 (2): 124-133 (2005)Spreading the word: the proliferation of research using social networks., , and . iConference, page 767-769. ACM, (2011)Charging Control and Transaction Accounting Mechanisms Using IRTL (Information Resource Transaction Layer) Middleware for P2P Services., , , , and . QofIS, volume 2511 of Lecture Notes in Computer Science, page 239-249. Springer, (2002)The Origin and Value of Disagreement Among Data Labelers: A Case Study of Individual Differences in Hate Speech Annotation., and . iConference (1), volume 13192 of Lecture Notes in Computer Science, page 425-444. Springer, (2022)RIP: the use of inoculation theory and online social networking for enhancing attractiveness of IT occupations., , and . CPR, page 139-142. ACM, (2009)eScience professional positions in the job market: a content analysis of job advertisements., , and . iConference, page 630-631. ACM, (2011)Beyond being (t)here: the social and personal implications of making music at a distance., and . iConference, page 686-687. ACM, (2011)Organizational Cultures of Libraries as a Strategic Resource., , , and . Libr. Trends, 53 (1): 33-53 (2004)Galton, Pearson, and the Peas: A Brief History of Linear Regression for Statistics Instructors. Journal of Statistics Education, (2001)Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange Perspectives, and . Surveillance & Society, 1 (2): 152--190 (2003)