Greenstadt, Rachel
71  Ergebnisse:
Personensuche X
?
1

Stoking the Flames: Understanding Escalation in an Online H..:

Take, Kejsi ; Zhong, Victoria ; Geeng, Chris...
Proceedings of the ACM on Human-Computer Interaction.  8 (2024)  CSCW1 - p. 1-23 , 2024
 
?
2

Can Deepfakes be created on a whim?:

, In: Companion Proceedings of the ACM Web Conference 2023,
Mehta, Pulak ; Jagatap, Gauri ; Gallagher, Kevin... - p. 1324-1334 , 2023
 
?
3

Studying the Online Deepfake Community:

Timmerman, Brian ; Mehta, Pulak ; Deb, Progga...
Journal of Online Trust and Safety.  2 (2023)  1 - p. , 2023
 
?
4

The Risks, Benefits, and Consequences of Prepublication Mod..:

Tran, Chau ; Champion, Kaylea ; Hill, Benjamin Mako.
Proceedings of the ACM on Human-Computer Interaction.  6 (2022)  CSCW2 - p. 1-25 , 2022
 
?
5

"It Feels Like Whack-a-mole": User Experiences of Data Remo..:

Take, Kejsi ; Gallagher, Kevin ; Forte, Andrea..
Proceedings on Privacy Enhancing Technologies.  2022 (2022)  3 - p. 159-178 , 2022
 
?
6

Conspiracy Brokers: Understanding the Monetization of YouTu..:

, In: Proceedings of the ACM Web Conference 2022,
Ballard, Cameron ; Goldstein, Ian ; Mehta, Pulak... - p. 2707-2718 , 2022
 
?
7

"So-called privacy breeds evil" : Narrative Justificatio..:

Bellini, Rosanna ; Tseng, Emily ; McDonald, Nora...
Proceedings of the ACM on Human-Computer Interaction.  4 (2021)  CSCW3 - p. 1-27 , 2021
 
?
8

Supervised Authorship Segmentation of Open Source Code Proj..:

Dauber, Edwin ; Erbacher, Robert ; Shearer, Gregory...
Proceedings on Privacy Enhancing Technologies.  2021 (2021)  4 - p. 464-479 , 2021
 
?
9

"So-called privacy breeds evil": Narrative Justifications f..:

Bellini, Rosanna ; Tseng, Emily ; McDonald, Nora...
Proceedings of the ACM on Human-Computer Interaction.  4 (2021)  CSCW3 - p. 1-27 , 2021
 
?
10

A large-scale characterization of online incitements to har..:

, In: Proceedings of the 21st ACM Internet Measurement Conference,
 
?
 
?
12

Exploring Paraphrasing Techniques on Formal Language for Ge..:

, In: 2020 IEEE 14th International Conference on Semantic Computing (ICSC),
 
?
13

Are anonymity-seekers just like everybody else? An analysis..:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
Tran, Chau ; Champion, Kaylea ; Forte, Andrea.. - p. 186-202 , 2020
 
?
14

Git Blame Who?: Stylistic Authorship Attribution of Small, ..:

Dauber, Edwin ; Caliskan, Aylin ; Harang, Richard...
Proceedings on Privacy Enhancing Technologies.  2019 (2019)  3 - p. 389-408 , 2019
 
?
15

Privacy, Anonymity, and Perceived Risk in Open Collaboratio..:

, In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems,
 
1-15