Author of the publication

Examining the Contribution of Critical Visualisation to Information Security.

, , , and . NSPW, page 59-72. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Fine Art of Conversation., , and . CogSci, cognitivesciencesociety.org, (2017)Critical visualization: a case for rethinking how we visualize risk and security., , and . J. Cybersecur., 1 (1): 93-108 (2015)Examining the Contribution of Critical Visualisation to Information Security., , , and . NSPW, page 59-72. ACM, (2015)Too Much Information: Questioning Security in a Post-Digital Society., , and . CHI, page 1-14. ACM, (2020)Protecting The Vulnerable: Dimensions of Assisted Digital Access., , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-26 (2022)Creative Data Ontology: 'Russian Doll' Metadata Versioning in Film and TV Post-Production Workflows., and . MTSR, volume 1355 of Communications in Computer and Information Science, page 204-215. Springer, (2020)The Navigation Metaphor in Security Economics., , , , , and . IEEE Secur. Priv., 14 (3): 14-21 (2016)Relations are more than Bytes: Re-thinking the Benefits of Smart Services through People and Things., , and . CHI, page 308. ACM, (2019)Drawing Out the Everyday Hyper-InSecurities of Digital Identity., and . CHI, page 254:1-254:18. ACM, (2022)Making Space for Interaction: Architects Design Dialogues., and . Gesture Workshop, volume 7206 of Lecture Notes in Computer Science, page 250-261. Springer, (2011)