Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conformity out of Diversity: Dynamics of Information Needs and Social Influence of Tags in Exploratory Information Search., , , and . HCI (16), volume 5638 of Lecture Notes in Computer Science, page 155-164. Springer, (2009)Exploratory information search by domain experts and novices., and . IUI, page 329-332. ACM, (2010)A Semantic Imitation Model of Social Tag Choices., , and . CSE (4), page 66-73. IEEE Computer Society, (2009)Teammate inaccuracy blindness: when information sharing tools hinder collaborative analysis., , and . CSCW, page 797-806. ACM, (2014)Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online., , , , and . SOUPS, page 77-96. USENIX Association, (2016)Do collaborators' annotations help or hurt asynchronous analysis., and . CSCW (Companion), page 123-126. ACM, (2012)Privacy Attitudes of Mechanical Turk Workers and the U.S. Public., , , and . SOUPS, page 37-49. USENIX Association, (2014)Semantic imitation in social tagging., , , and . ACM Trans. Comput.-Hum. Interact., 17 (3): 12:1-12:37 (2010)Strangers on Your Phone: Why People Use Anonymous Communication Applications., , and . CSCW, page 358-369. ACM, (2016)"My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security., , , and . SOUPS, page 39-52. USENIX Association, (2015)