Author of the publication

The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City.

, , , and . ICWSM, The AAAI Press, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SWAMI: a framework for collaborative filtering algorithm development and evaluation., , , , , and . SIGIR, page 366-368. ACM, (2000)Does this App Really Need My Location?: Context-Aware Privacy Management for Smartphones., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (3): 42:1-42:22 (2017)CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites., , , and . ACM Trans. Inf. Syst. Secur., 14 (2): 21:1-21:28 (2011)A comparative study of location-sharing privacy preferences in the United States and China., , , , , , and . Pers. Ubiquitous Comput., 17 (4): 697-711 (2013)Normal and Easy: Account Sharing Practices in the Workplace., , , , and . Proc. ACM Hum. Comput. Interact., 3 (CSCW): 83:1-83:25 (2019)"It's our mutual responsibility to share": The Evolution of Account Sharing in Romantic Couples., , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW1): 160:1-160:27 (2021)Challenge: ubiquitous location-aware computing and the "place lab" initiative., , , , , , , , and . WMASH, page 29-35. ACM, (2003)The state of phishing attacks.. Commun. ACM, 55 (1): 74-81 (2012)Sensor as a Company: On Self-Sustaining IoT Commons., , and . CoRR, (2021)Do They Accept or Resist Cybersecurity Measures? Development and Validation of the 13-Item Security Attitude Inventory (SA-13)., , and . CoRR, (2022)