Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The case for Zero Trust Digital Forensics., , , , and . Digit. Investig., 40 (Supplement): 301352 (2022)Altruism and anxiety: Engagement with online community support initiatives (OCSIs) during Covid-19 lockdown in the UK and Ireland., , , , , , , , , and 1 other author(s). CoRR, (2020)The Role of Ethological Observation for Measuring Animal Reactions to Biotelemetry Devices., , and . ACI, page 5:1-5:12. ACM, (2017)LiveBox: A Self-Adaptive Forensic-Ready Service for Drones., , , , , and . IEEE Access, (2019)Designing Technologies for Community Policing., , , , , , , , , and 1 other author(s). CHI Extended Abstracts, page 1-9. ACM, (2020)How Do People Use a Public Gratitude Platform in the Wild?, , , , , , , , , and 3 other author(s). CHI Extended Abstracts, page 187:1-187:7. ACM, (2024)Enhancing teaching using the Internet: report of the working group on the World Wide Web as an interactive teaching resource., , , , , , , and . ITiCSE, page 218-228. ACM, (1996)Designing Privacy-aware Internet of Things Applications., , , and . CoRR, (2017)Remote electronic examinations: student experiences., , , and . Br. J. Educ. Technol., 33 (5): 537-549 (2002)Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms., , , , and . IOT, page 83-92. ACM, (2016)