Author of the publication

Two experiences designing for effective security.

, , , , , , , , and . SOUPS, volume 93 of ACM International Conference Proceeding Series, page 25-34. ACM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special issue on science fiction and ubiquitous computing., and . Personal and Ubiquitous Computing, 18 (4): 765-766 (2014)"Resistance is futile": reading science fiction alongside ubiquitous computing., and . Personal and Ubiquitous Computing, 18 (4): 769-778 (2014)Back to the shed: gendered visions of technology and domesticity., and . Personal and Ubiquitous Computing, 11 (5): 373-381 (2007)Seeing like an interface.. OZCHI, volume 251 of ACM International Conference Proceeding Series, page 1-8. ACM, (2007)Beyond the user: use and non-use in HCI., and . OZCHI, volume 411 of ACM International Conference Proceeding Series, page 9-16. ACM, (2009)Seeking the source: software source code as a social and technical artifact., , and . GROUP, page 197-206. ACM, (2005)Process descriptions as organisational accounting devices: the dual use of workflow technologies.. GROUP, page 52-60. ACM, (2001)Implication for Desich. Montréal, Canada, ACM, (2006)A Divergence-Based Model of Synchrony and Distribution in Collaborative Systems. Rank Xerox Research Centre, Cambridge Laboratory, Cambridge, UK, (1994)Portholes: Supporting Awareness in a Distributed Group, and . Proc. Conf. on Human Factors in Computing Systems (CHI), (1992)