Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interdisciplinary Approaches to Understanding Artificial Intelligence's Impact on Society., , , and . CoRR, (2020)Engineering Privacy and Protest: A Case Study of AdNauseam., and . IWPE@SP, volume 1873 of CEUR Workshop Proceedings, page 57-64. CEUR-WS.org, (2017)Ethics and children's information systems., , , and . ASIST, volume 43 of Proc. Assoc. Inf. Sci. Technol., page 1-7. Wiley, (2006)Accountability in an Algorithmic Society: Relationality, Responsibility, and Robustness in Machine Learning., , , and . FAccT, page 864-876. ACM, (2022)Strategic Evaluation: Subjects, Evaluators, and Society., , , and . CoRR, (2023)Computer Vision and Conflicting Values: Describing People with Automated Alt Text., , , , and . AIES, page 543-554. ACM, (2021)Cryptography, Trust and Privacy: It's Complicated., , and . CSLAW, page 167-179. ACM, (2022)Going against the (Appropriate) Flow: A Contextual Integrity Approach to Privacy Policy Analysis., , , and . HCOMP, page 162-170. AAAI Press, (2019)Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford, California, (2010)An Analysis of Google Logs Retention Policies., and . J. Priv. Confidentiality, (2011)