Andrew Besmer

According to our database1, Andrew Besmer authored at least 13 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Effects of Privacy Notification Style and Frequency on Phone Usage.
J. Comput. Inf. Syst., 2021

2020
Investigating User Perceptions of Mobile App Privacy: An Analysis of User-Submitted App Reviews.
Int. J. Inf. Secur. Priv., 2020

2016
Studio workshop: e-cannons and other robot weapons.
Proceedings of the Special Interest Group on Computer Graphics and Interactive Techniques Conference, 2016

Studio project: e-cannons and other robot weapons.
Proceedings of the Special Interest Group on Computer Graphics and Interactive Techniques Conference, 2016

2015
Mapping User Preference to Privacy Default Settings.
ACM Trans. Comput. Hum. Interact., 2015

2012
+Your circles: sharing behavior on Google+.
Proceedings of the Symposium On Usable Privacy and Security, 2012

2010
The impact of social navigation on privacy policy configuration.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Users' (mis)conceptions of social applications.
Proceedings of the Graphics Interface 2010 Conference, May 31, 2010

Moving beyond untagging: photo privacy in a tagged world.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Social applications: exploring a more secure framework.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Tagged photos: concerns, perceptions, and protections.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
Understanding Privacy Settings in Facebook with an Audience View.
Proceedings of the Usability, Psychology, and Security, 2008


  Loading...