Подписаться
Mads Schaarup Andersen
Mads Schaarup Andersen
Senior Usable Security Expert
Подтвержден адрес электронной почты в домене alexandra.dk
Название
Процитировано
Процитировано
Год
Follow my recommendations: A personalized privacy assistant for mobile app permissions
B Liu, M Schaarup Andersen, F Schaub, H Almuhimedi, S Zhang, ...
SOUPS 2016-Proceedings of the 12th Symposium on Usable Privacy and Security …, 2016
285*2016
The creation and analysis of a website privacy policy corpus
S Wilson, F Schaub, AA Dara, F Liu, S Cherivirala, PG Leon, ...
Proceedings of the 54th Annual Meeting of the Association for Computational …, 2016
1962016
Kanthashree Mysore Sathyendra, N. Cameron Russell, Thomas B
S Wilson, F Schaub, AA Dara, F Liu, S Cherivirala, PG Leon, ...
Norton, Eduard Hovy, Joel Reidenberg, and Norman Sadeh. The Creation and …, 2016
792016
Beyond the individual: The contextual wheel of practice as a research framework for sustainable HCI
JM Entwistle, MK Rasmussen, N Verdezoto, RS Brewer, MS Andersen
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
572015
Towards a new classification of location privacy methods in pervasive computing
MS Andersen, MB Kjærgaard
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th …, 2012
122012
Implementing dynamic electricity taxation in Denmark
LH Albertsen, M Andersen, LR Boscán, AQ Santos
Energy policy 143, 111543, 2020
92020
Demystifying privacy policies with language technologies: Progress and challenges
S Wilson, F Schaub, A Dara, SK Cherivirala, S Zimmeck, MS Andersen, ...
Workshop Programme, 35, 2016
72016
The SITA principle for Location Privacy–Conceptual Model and Architecture
MS Andersen, MB Kjærgaard, K Grønbæk
PRISMS 2013, 2013
72013
Visualization and interactive exploration of data practices in privacy policies
SK Cherivirala, F Schaub, MS Andersen, S Wilson, N Sadeh, ...
Symposium on Usable Privacy and Security, 3-10, 2016
52016
On limitations of existing methods for location privacy
MS Andersen
3rd International Workshop on Security and Privacy in Spontaneous …, 2011
52011
Kanthashree Mysore Sathyendra, N Cameron Russell, Thomas B Norton, Eduard Hovy, Joel Reidenberg, and Norman Sadeh. 2016. The creation and analysis of a website privacy policy …
S Wilson, F Schaub, AA Dara, F Liu, S Cherivirala, PG Leon, ...
Proceedings of the 54th Annual Meeting of the Association for Computational …, 0
5
Personal informatics for non-geeks: lessons learned from ordinary people
G Calikli, MS Andersen, A Bandara, B Price, B Nuseibeh
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
42014
To deny, or not to deny: A personalized privacy assistant for mobile app permissions
B Liu, MS Andersen, F Schaub, H Almuhimedi, N Sadeh, Y Agarwal, ...
FTC PrivacyCon, 2016
12016
Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks
MS Andersen, MB Kjærgaard, K Grønbæk
Security and Privacy in Mobile Information and Communication Systems: 4th …, 2012
12012
Architectural mismatch issues in identity management deployment
MS Andersen
Proceedings of the Fourth European Conference on Software Architecture …, 2010
12010
Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark–Usefulness, Barriers, and Recommendations
MS Andersen
Proceedings of the 16th International Conference on Availability …, 2021
2021
Dosenrode, Søren Z. von:" Denmark: The Testing of a Hesitant Membership, in Hanf, Kenneth 8 Ben Soetendorp (eds.), Adapting to European integration
MS Andersen
2013
Multi-dimensional Location Priacy: Concepts. Architecture, and User Interface
MS Andersen
Department Office Computer Science, Aarhus University, 2013
2013
Identity management mismatch challenges in the Danish municipality administration system
MS Andersen, HB Christensen
Software Architecture: 4th European Conference, ECSA 2010, Copenhagen …, 2010
2010
Corpus Composition
S Wilson, F Schaub, AA Dara, F Liu, S Cherivirala, PG Leon, ...
Policy 550 (4), 73, 0
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20