Author of the publication

Healthcare and Security: Understanding and Evaluating the Risks.

, , , and . HCI (19), volume 6779 of Lecture Notes in Computer Science, page 99-108. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Education and design: using human-computer interaction case studies to learn., , and . ACM Southeast Regional Conference, page 346-351. ACM, (2008)Time: a method of detecting the dynamic variances of trust., , , and . WICOW, page 43-50. ACM, (2010)Ownership and Evolution of Local Process Representations., , , , , and . INTERACT (1), volume 5726 of Lecture Notes in Computer Science, page 560-573. Springer, (2009)Taking notes together: Augmenting note taking., , , , , and . CTS, page 16-23. IEEE, (2007)Healthcare and Security: Understanding and Evaluating the Risks., , , and . HCI (19), volume 6779 of Lecture Notes in Computer Science, page 99-108. Springer, (2011)CA3: collaborative annotation of audio in academia., , , , , and . ACM Southeast Regional Conference, page 461-466. ACM, (2007)Medical record privacy: is it a facade?, , , and . CHI Extended Abstracts, page 2203-2208. ACM, (2011)Trust in health websites: a review of an emerging field., , and . IHI, page 700-709. ACM, (2010)