Author of the publication

Ä Second Voice": Investigating Opportunities and Challenges for Interactive Voice Assistants to Support Home Health Aides.

, , , , , , , and . CHI, page 45:1-45:17. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Including the Voice of Care Recipients in Community Health Feedback Loops in Rural Kenya., , , , and . PACMHCI, 3 (CSCW): 71:1-71:20 (2019)Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh., , , and . Proc. ACM Hum. Comput. Interact., 1 (CSCW): 17:1-17:20 (2017)"I Go Beyond and Beyond" Examining the Invisible Work of Home Health Aides., , , , , , , and . Proc. ACM Hum. Comput. Interact., 7 (CSCW1): 1-21 (April 2023)Towards Informed Practice in HCI for Development., and . Proc. ACM Hum. Comput. Interact., 2 (CSCW): 99:1-99:20 (2018)"We can learn. Why not?": Designing Technologies to Engender Equity for Home Health Aides., , , and . CHI, page 1-14. ACM, (2020)Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors., , and . USENIX Security Symposium, page 89-104. USENIX Association, (2019)Clinical Computer Security for Victims of Intimate Partner Violence., , , , , and . USENIX Security Symposium, page 105-122. USENIX Association, (2019)Designing Extended Reality Guidance for Physical Caregiving Tasks., , , and . VR Workshops, page 419-422. IEEE, (2022)Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh., , , , and . ICTD, page 11. ACM, (2016)How Intention Informed Recommendations Modulate Choices: A Field Study of Spoken Word Content., , , , , , , , and . WWW, page 2169-2180. ACM, (2019)