Suivre
David Thaw
Titre
Citée par
Citée par
Année
Stopping spyware at the gate: a user study of privacy, notice and spyware
N Good, R Dhamija, J Grossklags, D Thaw, S Aronowitz, D Mulligan, ...
Proceedings of the 2005 symposium on Usable privacy and security, 43-52, 2005
2022005
Stopping spyware at the gate: a user study of privacy, notice and spyware
N Good, R Dhamija, J Grossklags, D Thaw, S Aronowitz, D Mulligan, ...
Proceedings of the 2005 symposium on Usable privacy and security, 43-52, 2005
2022005
The efficacy of cybersecurity regulation
D Thaw
Ga. St. UL Rev. 30, 287, 2013
972013
Enlightened regulatory capture
D Thaw
Wash. L. Rev. 89, 329, 2014
792014
Criminalizing Hacking, Not Dating: Reconstructing the CFAA Intent Requirement
D Thaw
Journal of Criminal Law and Criminology 103, 2013
552013
User Choices and Regret: Understanding Users’ Decision Process About Consensually Acquired Spyware
N Good, J Grossklags, D Thaw, A Perzanowski, D Mulligan, J Konstan
I/S: A Journal of Law and Policy for the Information Society 2 (2), 2006
502006
Reasonable Expectations of Privacy Settings: Social Media and the Stored Communications Act
CJ Borchert, FM Pinguelo, D Thaw
Duke L. & Tech. Rev. 13, 36, 2014
422014
Enhancing cybersecurity via artificial intelligence: Risks, rewards, and frameworks
JA Kroll, JB Michael, DB Thaw
Computer 54 (6), 64-71, 2021
132021
CoPE: Democratic CSCW in Support of e-learning
D Thaw, J Feldman, J Li
2008 International Conference on Complex, Intelligent and Software Intensive …, 2008
102008
Communities of practice environment
J Feldman, D Lee, D Thaw
WIT Transactions on Information and Communication Technologies 36, 2006
92006
When Machines Are Watching: How Warrantless Use of GPS Surveillance Technology Violates the Fourth Amendment Right Against Unreasonable Searches
PJ Smith, N Syed, D Thaw, A Wong
Yale Law Journal Online 121, 2011
72011
Supporting communities of learning practice by the effective embedding of information and knowledge into group activity
S Caballé, J Feldman, D Thaw
2008 International Conference on Complex, Intelligent and Software Intensive …, 2008
72008
Supporting communities of learning practice by the effective embedding of information and knowledge into group activity
S Caballé, J Feldman, D Thaw
2008 International Conference on Complex, Intelligent and Software Intensive …, 2008
72008
Communities of practice environment
J Feldman, D Thaw
US Patent App. 11/292,929, 2006
72006
Using camouflaged cyber simulations as a model to ensure validity in cybersecurity experimentation
C Gardner, A Waliga, D Thaw, S Churchman
arXiv preprint arXiv:1905.07059, 2019
62019
Ancient Worries and Modern Fears: Different Roots and Common Effects of US and EU Privacy Regulation
P Perri, D Thaw
Conn. L. Rev. 49, 1621, 2016
52016
Data Breach (Regulatory) Effects
D Thaw
Cardozo L. Rev. De-Novo, 151, 2015
52015
Surveillance at the Source
D Thaw
Ky. LJ 103, 405, 2014
52014
Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets
DB Thaw
University of California, Berkeley, 2011
52011
COVID-19 Vaccine Effectiveness and the Evidence on Boosters: A Systematic Review (with Partial Evidence on the Omicron Variant)
BS Black, D Thaw
Northwestern Law & Econ Research Paper, 21-57, 2022
42022
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20