Cited By
View all- Saleh MElagroudy PLukowicz PSturm C(2024)Ghost Readers of the Nile: Decrypting Password Sharing Habits in Chatting Applications among Egyptian WomenProceedings of the ACM on Human-Computer Interaction10.1145/36765068:MHCI(1-43)Online publication date: 24-Sep-2024
- Mcclearn JJensen RTalhouk R(2024)Security Patchworking in Lebanon: Infrastructuring Across Failing InfrastructuresProceedings of the ACM on Human-Computer Interaction10.1145/36373978:CSCW1(1-26)Online publication date: 26-Apr-2024
- Mustafa MAsad AHassan SHaider UDurrani ZKrombholz KMeng WJensen CCremers CKirda E(2023)Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design SpaceProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623087(195-209)Online publication date: 15-Nov-2023
- Show More Cited By