Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
- Rebecca E. GrinterProfessor and Associate Dean, Georgia Institute of TechnologyVerified email at cc.gatech.edu
- Arunesh MathurCompetition and Markets Authority, United KingdomVerified email at princeton.edu
- Jessica VitakProfessor, College of Information, University of MarylandVerified email at umd.edu
- Arvind NarayananProfessor, Princeton UniversityVerified email at cs.princeton.edu
- Priya C. KumarPennsylvania State UniversityVerified email at psu.edu
- Tamara CleggAssociate Professor, College of Information Studies, Department of Teaching and Learning, Policy andVerified email at umd.edu
- W. Keith EdwardsProfessor, Georgia TechVerified email at cc.gatech.edu
- Noah ApthorpeAssistant Professor of Computer Science, Colgate UniversityVerified email at colgate.edu
- Erika PooleSpectacle HealthVerified email at spectacle.health
- Srikanth SundaresanMetaVerified email at gatech.edu
- AJ Bernheim BrushMicrosoft ResearchVerified email at microsoft.com
- Edwin BlakeEmeritus Professor of Computer Science, University of Cape TownVerified email at cs.uct.ac.za
- Eli LucheriniPh.D. Student, Center for Information Technology Policy, Princeton UniversityVerified email at princeton.edu
- Jonathan MayerAssistant Professor of Computer Science and Public Affairs, Princeton UniversityVerified email at princeton.edu
- Michael J FriedmanPrinceton UniversityVerified email at princeton.edu
- Gunes AcarRadboud UniversityVerified email at cs.ru.nl
- Agnieszka Dutkowska-ŻukLancaster UniversityVerified email at lancaster.ac.uk
- Enrico CalandroCybersecurity Capacity Centre for Southern Africa, University of Cape TownVerified email at researchictafrica.net
- Elizabeth BonsignoreUniversity of Maryland, College ParkVerified email at umd.edu