Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Models and Patterns of Trust., , , , , , , and . CSCW, page 328-338. ACM, (2015)Managing integration work in an NHS electronic patient record (EPR) project., , and . Health Informatics J., 13 (1): 47-56 (2007)Telecare Call Centre Work and Ageing in Place., , , , , and . Comput. Support. Cooperative Work., 25 (1): 79-105 (2016)Domain crossing: how much expertise is enough?, , , , , , , and . CSCW (Companion), page 29-32. ACM, (2012)Threat awareness for critical infrastructures resilience., , , , , and . RNDM, page 196-202. IEEE, (2016)Designing with users for domestic environments: methods - challenges - lessons learned., , , , , and . CSCW Companion, page 335-338. ACM, (2014)“How Many Bloody Examples Do You Want?” Fieldwork and Generalisation, , and . ECSCW 2013: Proceedings of the 13th European Conference on Computer Supported Cooperative Work, 21-25 September 2013, Paphos, Cyprus, page 1--20. Springer, (2013)Having Fun With Evaluation., , and . BCS HCI, British Computer Society, (2014)Editorial message: special track on inter-disciplinary approaches to the design of dependable computer systems., , , , and . SAC, page 704-705. ACM, (2002)Reading as an Ordinary and Available Skill in Computer Programming., , and . PPIG, page 23. Psychology of Programming Interest Group, (2006)