Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan., , , , and . CHI Extended Abstracts, ACM, (2019)Truth, Lies and Trust on the Internet., and . Routledge, (2009)A case study of non-adoption: the values of location tracking in the family., , and . CSCW, page 779-788. ACM, (2012)To Like or Not to Like? An Experimental Study on Relational Closeness, Social Grooming, Reciprocity, and Emotions in Social Media Liking., , and . J. Comput. Mediat. Commun., (January 2023)Photographic Disclosure in Facebook and Relational Closeness with Others., , , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2018)"What do they snapchat about?" Patterns of use in time-limited instant messaging service., and . Comput. Hum. Behav., (2016)Secrets and lies in computer-mediated interaction: theory, methods and design., , and . CHI Extended Abstracts, page 3993-3996. ACM, (2008)Making an Entrance 2.0: The Linguistics of Introductory Success in Virtual Communities., , , , and . HICSS, page 1-10. IEEE Computer Society, (2011)Investigating the balance of privacy versus security in online family banking., , and . IDC, page 987-989. ACM, (2024)Privacy, Social Network Sites, and Social Relations, and . Journal of Technology in Human Services, (2010)