Author of the publication

Privacy patterns for online interactions

, , , , and . Proceedings of the 2006 conference on Pattern languages of programs, page 1--9. Portland, Oregon, ACM, (2006)
DOI: 10.1145/1415472.1415486

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity Management, Privacy, and Price Discrimination.. IEEE Secur. Priv., 6 (2): 46-50 (2008)Trust modelling for online transactions: a phishing scenario., , and . PST, volume 380 of ACM International Conference Proceeding Series, page 11. ACM, (2006)Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences., , , , , and . SOUPS, page 1-18. USENIX Association, (2014)The Welfare Impact of Targeted Advertising Technologies., , , and . Inf. Syst. Res., 33 (1): 131-151 (2022)Do Interruptions Pay Off? Effects of Interruptive Ads on Consumers Willingness to Pay., and . CoRR, (2020)Empirical Analysis of Data Breach Litigation., , and . ICIS, Association for Information Systems, (2011)When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information., and . WEIS, (2007)Health Disclosure Laws and Health Information Exchanges., , , , and . WEIS, (2011)Engineering Information Disclosure: Norm Shaping Designs., , , and . CHI, page 587-597. ACM, (2016)Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts., , , , , , , and . CHI, page 63:1-63:25. ACM, (2021)