Crea il mio profilo
Accesso pubblico
Visualizza tutto20 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Richmond Y. WongGeorgia Institute of TechnologyEmail verificata su gatech.edu
- John ChuangProfessor, UC Berkeley School of InformationEmail verificata su ischool.berkeley.edu
- James PierceUniversity of Washington, Design; UC Berkeley, Center for Long-Term CybersecurityEmail verificata su uw.edu
- Coye CheshireProfessor, School of Information, UC BerkeleyEmail verificata su ischool.berkeley.edu
- Sarah FoxCarnegie Mellon UniversityEmail verificata su cmu.edu
- Elena Márquez SeguraUniversidad Carlos III de Madrid (Madrid, Spain)Email verificata su uc3m.es
- Noura HowellDigital Media, Georgia TechEmail verificata su gatech.edu
- Chris ElsdenChancellor's Fellow, University of EdinburghEmail verificata su ed.ac.uk
- Phoebe SengersProfessor, Information Science and Science & Technology Studies, CornellEmail verificata su infosci.cornell.edu
- Vera KhovanskayaUC San DiegoEmail verificata su ucsd.edu
- Carl DiSalvo (he / him)Georgia Institute of TechnologyEmail verificata su gatech.edu
- Brooke Foucault WellesProfessor of Communication Studies, Northeastern UniversityEmail verificata su northeastern.edu
- Dawn NafusIntelEmail verificata su intel.com
- Luke StarkUniversity of Western OntarioEmail verificata su uwo.ca
Segui
Nick Merrill
Center for Long-Term Cybersecurity, UC Berkeley
Email verificata su berkeley.edu - Home page