Остановите войну!
for scientists:
default search action
Damon McCoy
- > Home > Persons > Damon McCoy
Publications
- 2022
- [j16]Kejsi Take, Kevin Gallagher, Andrea Forte, Damon McCoy, Rachel Greenstadt:
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites. Proc. Priv. Enhancing Technol. 2022(3): 159-178 (2022) - [c86]Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories. WWW 2022: 2707-2718 - [i12]Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories. CoRR abs/2205.15943 (2022) - 2021
- [c84]Maxwell Aliapoulios, Kejsi Take, Prashanth Ramakrishna, Daniel Borkan, Beth Goldberg, Jeffrey Sorensen, Anna Turner, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
A large-scale characterization of online incitements to harassment across platforms. Internet Measurement Conference 2021: 621-638 - 2020
- [j13]Rosanna Bellini, Emily Tseng, Nora McDonald, Rachel Greenstadt, Damon McCoy, Thomas Ristenpart, Nicola Dell:
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums. Proc. ACM Hum. Comput. Interact. 4(CSCW3): 1-27 (2020) - [c77]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. USENIX Security Symposium 2020: 1893-1909 - [c76]Janith Weerasinghe, Bailey Flanigan, Aviel J. Stein, Damon McCoy, Rachel Greenstadt:
The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse. WWW 2020: 1874-1884 - [i8]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. CoRR abs/2005.14341 (2020) - 2018
- [j12]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(1): 1-4 (2018) - [j11]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(2): 1-3 (2018) - [j10]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(3): 1-4 (2018) - [j9]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(4): 1-4 (2018) - [i4]Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy:
Under the Underground: Predicting Private Interactions in Underground Forums. CoRR abs/1805.04494 (2018) - 2017
- [j8]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(1): 1-3 (2017) - [j7]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(2): 1-3 (2017) - [j6]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(3): 1 (2017) - [j5]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(4): 1-4 (2017) - 2014
- [c34]Sadia Afroz, Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, Damon McCoy:
Doppelgänger Finder: Taking Stylometry to the Underground. IEEE Symposium on Security and Privacy 2014: 212-226 - 2013
- [c33]Sadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt:
Honor among thieves: A common's analysis of cybercrime economies. eCrime 2013: 1-11
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint