Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collectively exercising the right of access: individual effort, societal effect., , and . Internet Policy Rev., (2018)The Impact of User Location on Cookie Notices (Inside and Outside of the European Union)., , , and . CoRR, (2021)Code & Vorurteil: Über Künstliche Intelligenz, Rassismus und Antisemitismus, , , , , , , , , and 7 other author(s). Edition Bildungsstätte Anne Frank Verbrecher, Berlin, (2024)Security collapse in the HTTPS market., , , and . Commun. ACM, 57 (10): 47-55 (2014)Internet Measurements and Public Policy: Mind the Gap., , and . CSET, USENIX Association, (2013)The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data., , , , and . WEIS, (2010)Approximating Accessibility of Regions from Incomplete Volunteered Data., , and . CHI Extended Abstracts, page 322:1-322:6. ACM, (2022)On the Prevalence of Leichte Sprache on the German Web., , and . WebSci, page 147-152. ACM, (2023)AI for the public. How public interest theory shifts the discourse on AI., and . AI Soc., 38 (2): 815-828 (April 2023)Economics of Fighting Botnets: Lessons from a Decade of Mitigation., , and . IEEE Secur. Priv., 13 (5): 16-23 (2015)