Author of the publication

From Intent to Action: Nudging Users Towards Secure Mobile Payments.

, , , , , and . SOUPS @ USENIX Security Symposium, page 379-415. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAPS: Scaling Privacy Compliance Analysis to a Million Apps., , , , , , , and . Proc. Priv. Enhancing Technol., 2019 (3): 66-86 (2019)Editor's introduction to regular section., , , and . Electron. Commer. Res. Appl., 6 (2): 183 (2007)Publishing ecommerce research- or how to maintain quality and diversity.. ICEC, volume 258 of ACM International Conference Proceeding Series, page 411-412. ACM, (2007)Blackboard Agents for Mixed-Initiative Management of Integrated Process-Planning/Production-Scheduling Solutions Across the Supply Chain., , , , , and . AAAI/IAAI, page 1000-1005. AAAI Press / The MIT Press, (1997)An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites., , , , , , , , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)Question Answering for Privacy Policies: Combining Computational and Legal Perspectives., , , , and . EMNLP/IJCNLP (1), page 4946-4957. Association for Computational Linguistics, (2019)A Tale of Two Regulatory Regimes: Creation and Analysis of a Bilingual Privacy Policy Corpus., , , , , , , , , and 4 other author(s). LREC, page 5460-5472. European Language Resources Association, (2022)Factoring games to isolate strategic interactions., , , and . AAMAS, page 68. IFAAMAS, (2007)Learning to detect phishing emails., , and . WWW, page 649-656. ACM, (2007)Modeling people's place naming preferences in location sharing., , , and . UbiComp, page 75-84. ACM, (2010)