Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults, , and . Proceedings of the seventh annual ACM/IEEE international conference on Human-Robot Interaction - HRI \textquotesingle12, ACM Press, (2012)Understanding the wearability of head-mounted devices from a human-centered perspective., and . ISWC, page 83-86. ACM, (2014)Audience visualization influences disclosures in online social networks., , and . CHI Extended Abstracts, page 1663-1668. ACM, (2011)Defending against device theft with human notarization., , , and . CollaborateCom, page 8-17. ICST / IEEE, (2014)Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms., , , , , , and . CHI, page 367. ACM, (2019)Investigating contextual cues as indicators for EMA delivery., , , , and . UbiComp/ISWC Adjunct, page 935-940. ACM, (2017)Swipe a Screen or Say the Word: Older Adults' Preferences for Information-seeking with Touchscreen and Voice-User Interfaces., , , , and . OZCHI, page 130-143. ACM, (2021)Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology., , , and . Proc. Priv. Enhancing Technol., 2020 (1): 83-102 (2020)Limited but satisfied: Low SES older adults experiences of aging in place., , , and . PervasiveHealth, page 121-128. ICST, (2015)One step forward, two steps back: The key to wearables in the field is the app., , and . PervasiveHealth, page 241-244. ICST, (2015)