Stopping spyware at the gate: a user study of privacy, notice and spyware N Good, R Dhamija, J Grossklags, D Thaw, S Aronowitz, D Mulligan, ... Proceedings of the 2005 symposium on Usable privacy and security, 43-52, 2005 | 202 | 2005 |
The efficacy of cybersecurity regulation D Thaw Ga. St. UL Rev. 30, 287, 2013 | 99 | 2013 |
Enlightened regulatory capture D Thaw Wash. L. Rev. 89, 329, 2014 | 80 | 2014 |
Criminalizing Hacking, Not Dating: Reconstructing the CFAA Intent Requirement D Thaw Journal of Criminal Law and Criminology 103, 2013 | 56 | 2013 |
User Choices and Regret: Understanding Users’ Decision Process About Consensually Acquired Spyware N Good, J Grossklags, D Thaw, A Perzanowski, D Mulligan, J Konstan I/S: A Journal of Law and Policy for the Information Society 2 (2), 2006 | 50 | 2006 |
Reasonable Expectations of Privacy Settings: Social Media and the Stored Communications Act CJ Borchert, FM Pinguelo, D Thaw Duke L. & Tech. Rev. 13, 36, 2014 | 43 | 2014 |
Enhancing cybersecurity via artificial intelligence: Risks, rewards, and frameworks JA Kroll, JB Michael, DB Thaw Computer 54 (6), 64-71, 2021 | 14 | 2021 |
CoPE: Democratic CSCW in Support of e-learning D Thaw, J Feldman, J Li 2008 International Conference on Complex, Intelligent and Software Intensive …, 2008 | 10 | 2008 |
Communities of practice environment J Feldman, D Lee, D Thaw WIT Transactions on Information and Communication Technologies 36, 2006 | 9 | 2006 |
When Machines Are Watching: How Warrantless Use of GPS Surveillance Technology Violates the Fourth Amendment Right Against Unreasonable Searches PJ Smith, N Syed, D Thaw, A Wong Yale Law Journal Online 121, 2011 | 7 | 2011 |
Supporting communities of learning practice by the effective embedding of information and knowledge into group activity S Caballé, J Feldman, D Thaw 2008 International Conference on Complex, Intelligent and Software Intensive …, 2008 | 7 | 2008 |
Communities of practice environment J Feldman, D Thaw US Patent App. 11/292,929, 2006 | 7 | 2006 |
Using camouflaged cyber simulations as a model to ensure validity in cybersecurity experimentation C Gardner, A Waliga, D Thaw, S Churchman arXiv preprint arXiv:1905.07059, 2019 | 6 | 2019 |
Ancient Worries and Modern Fears: Different Roots and Common Effects of US and EU Privacy Regulation P Perri, D Thaw Conn. L. Rev. 49, 1621, 2016 | 5 | 2016 |
Data Breach (Regulatory) Effects D Thaw Cardozo L. Rev. De-Novo, 151, 2015 | 5 | 2015 |
Surveillance at the Source D Thaw Ky. LJ 103, 405, 2014 | 5 | 2014 |
Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets DB Thaw University of California, Berkeley, 2011 | 5 | 2011 |
COVID-19 Vaccine Effectiveness and the Evidence on Boosters: A Systematic Review (with Partial Evidence on the Omicron Variant) BS Black, D Thaw Northwestern Law & Econ Research Paper, 21-57, 2022 | 4 | 2022 |
Cybersecurity Stovepiping D Thaw Neb. L. Rev. 96, 339, 2017 | 3 | 2017 |
Rebooting congressional cybersecurity oversight C Cordero, D Thaw Center for a New American Security, 2022 | 2 | 2022 |