Roesner, Franziska (Author)
User-driven access control improves users’ security and privacy by changing the system to better match their expectations, rather than the other way around.
...More
Article
Ons Al-Shamaileh;
(June 2018)
I Have Issues with Facebook: But I Will Keep Using It
(/isis/citation/CBB503279988/)
Article
Siddique Latif;
Adnan Qayyum;
Muhammad Usama;
Junaid Qadir;
Andrej Zwitter;
Muhammad Shahzad;
(September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development
(/isis/citation/CBB326485886/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Article
Jeremy Pitt;
Agnieszka Rychwalska;
Magdalena Roszczynska-Kurasinska;
Andrzej Nowak;
(March 2019)
Democratizing Platforms for Social Coordination
(/isis/citation/CBB485378597/)
Article
Katina Michael;
Diana Bowman;
Meg Leta Jones;
Ramona Pringle;
(March 2018)
Robots and Socio-Ethical Implications [Guest Editorial]
(/isis/citation/CBB056930455/)
Article
Kira Lussier;
(March 2018)
From the Intuitive Human to the Intuitive Computer
(/isis/citation/CBB266223107/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/isis/citation/CBB486585682/)
Book
John Cheney-Lippold;
(2017)
We are data : Algorithms and the making of our digital selves
(/isis/citation/CBB593815757/)
Review
Russell, Andrew;
(2016)
Review of unknown publication
(/isis/citation/CBB100069195/)
Article
Ben Collier;
James Stewart;
(2022)
Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network
(/isis/citation/CBB749753638/)
Book
Ashley Sweetman;
(2022)
Cyber and the City: Securing London’s Banks in the Computer Age
(/isis/citation/CBB340774234/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/isis/citation/CBB758382142/)
Article
Morgan M. Broman;
Pamela Finckenberg-Broman;
(March 2018)
Socio-Economic and Legal Impact of Autonomous Robotics and AI Entities: The RAiLE Project
(/isis/citation/CBB378072755/)
Article
Yoshiyasu Takefuji;
(March 2018)
Connected Vehicle Security Vulnerabilities
(/isis/citation/CBB280716653/)
Book
Geoff White;
(2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
(/isis/citation/CBB227937681/)
Article
Roba Abbas;
Holly Tootell;
Mark Freeman;
Grant Ellmers;
(September 2018)
Engaging Young Children as Application Design Partners: A Stakeholder-Inclusive Methodological Approach
(/isis/citation/CBB653005533/)
Article
Peter Andras;
Lukas Esterle;
Michael Guckert;
The Anh Han;
Peter R. Lewis;
Kristina Milanovic;
Terry Payne;
Cedric Perret;
Jeremy Pitt;
Simon T. Powers;
Neil Urquhart;
Simon Wells;
(December 2018)
Trusting Intelligent Machines: Deepening Trust Within Socio-Technical Systems
(/isis/citation/CBB573643849/)
Article
Alessandra Sciutti;
Martina Mara;
Vincenzo Tagliasco;
Giulio Sandini;
(March 2018)
Humanizing Human-Robot Interaction: On the Importance of Mutual Understanding
(/isis/citation/CBB638175374/)
Article
O. M. Bonastre;
A. Veà;
(2019)
Origins of the Domain Name System
(/isis/citation/CBB653105189/)
Article
Eugene H. Spafford;
(Summer 2007)
Voter Assurance
(/isis/citation/CBB265646858/)
Be the first to comment!