Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
Rebecca E. GrinterProfessor and Associate Dean, Georgia Institute of TechnologyVerified email at cc.gatech.edu
Arunesh MathurCompetition and Markets Authority, United KingdomVerified email at princeton.edu
Jessica VitakProfessor, College of Information, University of MarylandVerified email at umd.edu
Arvind NarayananProfessor, Princeton UniversityVerified email at cs.princeton.edu
Priya C. KumarPennsylvania State UniversityVerified email at psu.edu
W. Keith EdwardsProfessor, Georgia TechVerified email at cc.gatech.edu
Tamara CleggAssociate Professor, College of Information Studies, Department of Teaching and Learning, Policy andVerified email at umd.edu
Noah ApthorpeAssistant Professor of Computer Science, Colgate UniversityVerified email at colgate.edu
Erika PooleAnthem IncVerified email at anthem.com
Srikanth SundaresanMetaVerified email at gatech.edu
AJ Bernheim BrushMicrosoft ResearchVerified email at microsoft.com
Edwin BlakeEmeritus Professor of Computer Science, University of Cape TownVerified email at cs.uct.ac.za
Eli LucheriniPh.D. Student, Center for Information Technology Policy, Princeton UniversityVerified email at princeton.edu
Jonathan MayerAssistant Professor of Computer Science and Public Affairs, Princeton UniversityVerified email at princeton.edu
Michael J FriedmanPrinceton UniversityVerified email at princeton.edu
Gunes AcarRadboud UniversityVerified email at cs.ru.nl
Enrico CalandroCybersecurity Capacity Centre for Southern Africa, University of Cape TownVerified email at researchictafrica.net
Agnieszka Dutkowska-ŻukLancaster UniversityVerified email at lancaster.ac.uk
Elizabeth BonsignoreUniversity of Maryland, College ParkVerified email at umd.edu