Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knowledge sharing, maintenance, and use in online support communities.. CHI Extended Abstracts, page 1751-1754. ACM, (2006)The DELAY Framework: Designing for Extended LAtencY., , , , , , , , and . CHI, page 1-13. ACM, (2020)Civic action brokering platforms: facilitating local engagement with ACTion Alexandria., , , , and . CSCW, page 1308-1322. ACM, (2014)Training Future Cybersecurity Professionals in Spear Phishing using SiEVE., , , and . SIGITE, page 135-140. ACM, (2018)Do You Know the Way to SNA?: A Process Model for Analyzing and Visualizing Social Media Network Data., , , , , , and . SocialInformatics, page 304-313. IEEE Computer Society, (2012)We are visible: technology-mediated social participation in a Twitter network for the homeless., and . iConference, page 492-493. ACM, (2012)Pervasive Play., , , , and . CHI Extended Abstracts, page 3317-3324. ACM, (2016)Design tactics for authentic interactive fiction: insights from alternate reality game designers., , , , , and . CHI, page 947-950. ACM, (2014)Traversing Transmedia Together: Co-designing an Educational Alternate Reality Game For Teens, With Teens., , , , , , , , , and 2 other author(s). IDC, page 11-24. ACM, (2016)Calculating error rates for filtering software., , and . Commun. ACM, 47 (9): 67-71 (2004)