Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Acceptable State: an Analysis of the current State of Acceptable Use Policies in Academic Institutions., and . ECIS, (2019)An Economic Study of the Effect of Android Platform Fragmentation on Security Updates., , и . Financial Cryptography, том 10957 из Lecture Notes in Computer Science, стр. 119-137. Springer, (2018)Setting the Stage: Towards Principles for Reasonable Image Inferences., и . UMAP (Adjunct Publication), стр. 301-307. ACM, (2019)Using Conjoint Analysis to Investigate the Value of Interdependent Privacy in Social App Adoption Scenarios., и . ICIS, Association for Information Systems, (2015)Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities., , , и . CoRR, (2019)Sharing Is Caring, or Callous?, и . CANS, том 10052 из Lecture Notes in Computer Science, стр. 670-680. (2016)Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics., , , , , и . iThings/GreenCom/CPSCom/SmartData, стр. 1402-1409. IEEE, (2018)Uncertainty, Ambiguity and Privacy., и . WEIS, (2005)The Differences in Data Sensitivity Perceptions among Private and Workplace Health Apps: A Delphi Study., , , и . PDH, стр. 21-30. ACM, (2019)Young adults and online political participation: search strategies and the role of social media., , и . DG.O, стр. 302-306. Digital Government Research Center, (2011)