Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
Rebecca E. GrinterProfessor and Associate Dean, Georgia Institute of TechnologyVerified email at cc.gatech.edu
Arunesh MathurCompetition and Markets Authority, United KingdomVerified email at princeton.edu
Jessica VitakProfessor, College of Information, University of MarylandVerified email at umd.edu
Arvind NarayananProfessor, Princeton UniversityVerified email at cs.princeton.edu
Priya C. KumarPennsylvania State UniversityVerified email at psu.edu
Tamara CleggAssociate Professor, College of Information Studies, Department of Teaching and Learning, Policy andVerified email at umd.edu
W. Keith EdwardsProfessor, Georgia TechVerified email at cc.gatech.edu
Noah ApthorpeAssistant Professor of Computer Science, Colgate UniversityVerified email at colgate.edu
Erika PooleSpectacle HealthVerified email at spectacle.health
Srikanth SundaresanMetaVerified email at gatech.edu
Edwin BlakeEmeritus Professor of Computer Science, University of Cape TownVerified email at cs.uct.ac.za
AJ Bernheim BrushMicrosoft ResearchVerified email at microsoft.com
Eli LucheriniPh.D. Student, Center for Information Technology Policy, Princeton UniversityVerified email at princeton.edu
Jonathan MayerAssociate Professor of Computer Science and Public Affairs, Princeton UniversityVerified email at princeton.edu
Michael J FriedmanPrinceton UniversityVerified email at princeton.edu
Gunes AcarRadboud UniversityVerified email at cs.ru.nl
Agnieszka Dutkowska-ŻukLancaster UniversityVerified email at lancaster.ac.uk
William David TuckerStellenbosch UniversityVerified email at sun.ac.za
Enrico CalandroCybersecurity Capacity Centre for Southern Africa, University of Cape TownVerified email at researchictafrica.net