Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Labscape: A Smart Environment for the Cell Biology Laboratory., , , , , , and . IEEE Pervasive Computing, 1 (3): 13-21 (2002)The Drop: pragmatic problems in the design of a compelling, pervasive game., , and . Computers in Entertainment, 3 (3): 4 (2005)The CareNet Display: Lessons Learned from an In Home Evaluation of an Ambient Display., , and . UbiComp, volume 3205 of Lecture Notes in Computer Science, page 1-17. Springer, (2004)SoK: A Framework for Unifying At-Risk User Research., , , , , , , , , and . CoRR, (2021)Helping You Protect You., , , , , and . IEEE Secur. Priv., 12 (1): 39-42 (2014)Designing Toxic Content Classification for a Diversity of Perspectives., , , , , , , and . SOUPS @ USENIX Security Symposium, page 299-318. USENIX Association, (2021)Theory-driven design strategies for technologies that support behavior change in everyday life., , and . CHI, page 405-414. ACM, (2009)"She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households., , , , , and . CHI, page 5921-5932. ACM, (2016)Using the Experience Sampling Method to Evaluate Ubicomp Applications., and . IEEE Pervasive Computing, 2 (2): 24-31 (2003)Rethinking Connection Security Indicators., , , , , , , , and . SOUPS, page 1-14. USENIX Association, (2016)