Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bugs in our Pockets: The Risks of Client-Side Scanning, , , , , , , , , and 4 other author(s). (Oct 14, 2021)Measuring the usability and capability of App inventor to create mobile Applications., , and . PROMOTO@SPLASH, page 1-8. ACM, (2015)A Picture Is Worth a Thousand Words: Co-designing Text-to-Image Generation Learning Materials for K-12 with Educators., , , , and . AAAI, page 23260-23267. AAAI Press, (2024)"How Can I Code A.I. Responsibly?": The Effect of Computational Action on K-12 Students Learning and Creating Socially Responsible A.I., , , and . AAAI, page 16017-16024. AAAI Press, (2023)The State of the Field in Computational Thinking Assessment., , , , , , , , , and 13 other author(s). ICLS, International Society of the Learning Sciences, (2018)No technical understanding required: helping users make informed choices about access to their personal data., , , , and . MobiQuitous, page 140-150. ICST / ACM, (2014)Access Control is an Inadequate Framework for Privacy Protection, and . W3C Workshop on Privacy for Advanced Web APIs, (2010)Paper Nr. 20.ccREL: The Creative Commons Rights Expression Language, , , and . (March 2008)Educational programs in computer science and law: panel., , , , , and . CSLAW, page 1. ACM, (2019)From computational thinking to computational values.. SIGCSE, page 239-240. ACM, (2012)