Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pictographs, Ideograms, and Emojis (PIE): A Framework for Empirical Research Using Non-verbal Cues., , and . HICSS, page 1-10. ScholarSpace, (2021)Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences., , , , , and . SOUPS, page 1-18. USENIX Association, (2014)Parental Trust in Automated Detection of Cyberpredators.. MIPRO, page 30-35. IEEE, (2023)Understanding the Role of Nonverbal Tokens in the Spread of Online Information., , and . HICSS, page 5484-5493. ScholarSpace, (2023)Sleights of privacy: framing, disclosures, and the limits of transparency., , , and . SOUPS, page 9:1-9:11. ACM, (2013)TD-CHAIN: A System to Enhance Transparency in Data Flows., , , and . AMCIS, Association for Information Systems, (2017)Is it the Typeset or the Type of Statistics? Disfluent Font does not Reduce Self-disclosure., , , , and . LASER, page 1-11. USENIX Association, (2013)Privacy Concerns and Protection Motivation Theory in the Context of Mobile Banking., , , and . ECIS, (2019)Negative Information Looms Longer than Positive Information., , and . WEIS, (2011)Misplaced Confidences: Privacy and the Control Paradox, , and . Social Psychology and Personality Science, (2012)Preprint.