Author of the publication

Moving from the design of usable security technologies to the design of useful secure applications.

, and . NSPW, page 82-89. ACM, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collectivistic health promotion tools: Accounting for the relationship between culture, food and nutrition., and . Int. J. Hum. Comput. Stud., 72 (2): 185-206 (2014)The Rise and Fall of Netville: The Saga of a Cyperspace Construction Boomtown in the Great Divide., , and . Electron. Mark., 7 (1): 21-24 (1997)In Search of Usable Security: Five Lessons from the Field., , , and . IEEE Secur. Priv., 2 (5): 19-24 (2004)How Smart Homes Learn: The Evolution of the Networked Home and Household., , and . UbiComp, volume 4717 of Lecture Notes in Computer Science, page 127-144. Springer, (2007)Chatting with teenagers: Considering the place of chat technologies in teen life., , and . ACM Trans. Comput. Hum. Interact., 13 (4): 423-447 (2006)Using Dialog and Context in a Speech-Based interface for an Information Visualization Environment., , , , and . Advanced Visual Interfaces, page 274-275. ACM Press, (2000)UNDER DEVELOPMENT: While the meter is running: computing in a capped world., , , , and . Interactions, 18 (2): 72-75 (2011)Missing the wave? Scattershot funding has its costs., , and . IEEE Pervasive Comput., 4 (1): 80-82 (2005)It Takes (at least) Two: The Work to Make Romance Work., , , and . CHI, page 566:1-566:17. ACM, (2023)Extraordinary computing: religion as a lens for reconsidering the home., and . CHI, page 749-758. ACM, (2009)