Author of the publication

Do the Privacy Policies Reflect the Privacy Controls on Social Networks?

, , and . SocialCom/PASSAT, page 1155-1158. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe, , , , , , , and . Computer, 43 (2): 19-26 (2010)3rd workshop on assessment of contemporary modularization techniques (ACoM 2009)., , , , , , and . OOPSLA Companion, page 715-716. ACM, (2009)A Framework for Testing Distributed Systems., , and . Peer-to-Peer Computing, page 262-263. IEEE Computer Society, (2004)Pointcut Rejuvenation: Recovering Pointcut Expressions in Evolving Aspect-Oriented Software., , , and . ASE, page 575-579. IEEE Computer Society, (2009)On the Contributions of an End-to-End AOSD Testbed., , , , , , , , , and 16 other author(s). EA@ICSE, page 8. IEEE, (2007)UDesignIt: Towards social media for community-driven design., , and . ICSE, page 1321-1324. IEEE Computer Society, (2012)EA-Analyzer: a tool for identifying conflicting dependencies in requirements documents., , , , and . EA@AOSD, page 43-44. ACM, (2009)On the Impact of Evolving Requirements-Architecture Dependencies: An Exploratory Study., , , and . CAiSE, volume 5074 of Lecture Notes in Computer Science, page 243-257. Springer, (2008)Who Am I? Analyzing Digital Personas in Cybercrime Investigations., , , , , and . Computer, 46 (4): 54-61 (2013)Towards Benchmarking Data Literacy., , , and . WWW (Companion Volume), page 408-416. ACM, (2022)