Author of the publication

Social Personal Data Stores: the Nuclei of Decentralised Social Machines.

, , , , , , and . WWW (Companion Volume), page 1155-1160. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Should We Support Designing Privacy-Friendly Apps for Children? Using a Research through Design Process to Understand Developers' Needs and Challenges., , and . CoRR, (2023)Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics., , , , , , , , , and 1 other author(s). CoRR, (2020)Protection or punishment? relating the design space of parental control apps and perceptions about them to support parenting for online safety., , , and . CoRR, (2021)OPF: A Distributed Context-Sensing Framework for Ubiquitous Computing Environments., , , and . UCS, volume 4239 of Lecture Notes in Computer Science, page 82-97. Springer, (2006)Webbox+page blossom: exploring design for aktive data interaction., , and . CHI Extended Abstracts, page 2033-2038. ACM, (2012)12 Ways to Empower: Designing for Children's Digital Autonomy., , , and . CHI, page 91:1-91:27. ACM, (2023)Common Barriers to the Use of Patient-Generated Data Across Clinical Settings., , , , and . CHI, page 484. ACM, (2018)A Fait Accompli? An Empirical Study into the Absence of Consent to Third-Party Tracking in Android Apps., , , , , , and . SOUPS @ USENIX Security Symposium, page 181-196. USENIX Association, (2021)From Coincidence to Purposeful Flow? Properties of Transcendental Information Cascades., , , and . ASONAM, page 633-638. ACM, (2015)Gui --- phooey!: the case for text input., , , and . UIST, page 193-202. ACM, (2007)