Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Engineering Privacy and Protest: A Case Study of AdNauseam., and . IWPE@SP, volume 1873 of CEUR Workshop Proceedings, page 57-64. CEUR-WS.org, (2017)Respecting Context to Protect Privacy: Why Meaning Matters.. Sci. Eng. Ethics, 24 (3): 831-852 (2018)Ethics and children's information systems., , , and . ASIST, volume 43 of Proc. Assoc. Inf. Sci. Technol., page 1-7. Wiley, (2006)Accountability in an Algorithmic Society: Relationality, Responsibility, and Robustness in Machine Learning., , , and . CoRR, (2022)Privacy Challenges in Patient-centric Health Information Systems., , , , and . HealthSec, USENIX Association, (2010)Values in Design - Building Bridges between RE, HCI and Ethics., , , and . INTERACT (4), volume 6949 of Lecture Notes in Computer Science, page 746-747. Springer, (2011)The cutting edge.. SIGCAS Computers and Society, 28 (1): 38-39 (1998)Trust: A Collision of Paradigms., , and . Financial Cryptography, volume 2339 of Lecture Notes in Computer Science, page 82-96. Springer, (2001)Software Agents and User Autonomy., and . Agents, page 466-469. ACM, (1997)The VACCINE Framework for Building DLP Systems., , , , , and . CoRR, (2017)