Author of the publication

Problematic Empowerment: West African Internet Scams as Strategic Misrepresentation

. Information Technology and International Development, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collectively defining context in a mobile, networked computing environment., and . CHI Extended Abstracts, page 231-232. ACM, (2001)Evaluating Shared Access: social equality and the circulation of mobile phones in rural Uganda.. J. Comput. Mediat. Commun., 15 (2): 230-250 (2010)'I have great desires to look beyond my world': trajectories of information and communication technology use among Ghanaians living abroad., and . New Media Soc., 10 (2): 203-224 (2008)Extending ubiquitous computing to vineyards., , and . CHI Extended Abstracts, page 822-823. ACM, (2003)Problematic Empowerment: West African Internet Scams as Strategic Misrepresentation. Information Technology and International Development, (2008)'Connected Learning' and the Equity Agenda: A Microsociology of Minecraft Play., and . CSCW, page 446-457. ACM, (2017)'This All Together, Hon?' Ubicomp in Non-office Work Environments., , , , and . UbiComp, volume 3205 of Lecture Notes in Computer Science, page 179-195. Springer, (2004)Context-Aware Computing: A Test Case., , , and . UbiComp, volume 2498 of Lecture Notes in Computer Science, page 1-15. Springer, (2002)Refusing, limiting, departing: why we should study technology non-use., , , , and . CHI Extended Abstracts, page 65-68. ACM, (2014)Designing for context: usability in a ubiquitous environment., , and . CUU, page 80-84. ACM, (2000)