Author of the publication

Towards an Understanding of Security Concerns within Communities.

, , , , and . WiMob, page 478-483. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing integration work in an NHS electronic patient record (EPR) project., , and . Health Informatics J., 13 (1): 47-56 (2007)Models and Patterns of Trust., , , , , , , and . CSCW, page 328-338. ACM, (2015)Telecare Call Centre Work and Ageing in Place., , , , , and . Comput. Support. Cooperative Work., 25 (1): 79-105 (2016)Designing with users for domestic environments: methods - challenges - lessons learned., , , , , and . CSCW Companion, page 335-338. ACM, (2014)Domain crossing: how much expertise is enough?, , , , , , , and . CSCW (Companion), page 29-32. ACM, (2012)Threat awareness for critical infrastructures resilience., , , , , and . RNDM, page 196-202. IEEE, (2016)“How Many Bloody Examples Do You Want?” Fieldwork and Generalisation, , and . ECSCW 2013: Proceedings of the 13th European Conference on Computer Supported Cooperative Work, 21-25 September 2013, Paphos, Cyprus, page 1--20. Springer, (2013)Having Fun With Evaluation., , and . BCS HCI, British Computer Society, (2014)Editorial message: special track on inter-disciplinary approaches to the design of dependable computer systems., , , , and . SAC, page 704-705. ACM, (2002)Reading as an Ordinary and Available Skill in Computer Programming., , and . PPIG, page 23. Psychology of Programming Interest Group, (2006)