Author of the publication

Joint implicit alignment work of interaction designers and software developers.

, , and . NordiCHI, page 693-702. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Software for Affective Education: A Case Study of the Affective Walkthrough., , and . HCI (27), volume 618 of Communications in Computer and Information Science, page 226-231. Springer, (2016)Graphical passwords: Learning from the first twelve years., , and . ACM Comput. Surv., 44 (4): 19:1-19:41 (2012)Hacking with multi-touch for Java (MT4j)., , , and . Mobile!@SPLASH, page 17-20. ACM, (2016)Improving text passwords through persuasion., , , and . SOUPS, page 1-12. ACM, (2008)Do you see your password?: applying recognition to textual passwords., , and . SOUPS, page 8. ACM, (2012)Activity Theory for Design From Checklist to Interview - From Checklist to Interview., , and . HWID, volume 221 of IFIP, page 1-25. Springer, (2006)My Friend the Customer., , , and . EuroPLoP, page 199-214. UVK - Universitaetsverlag Konstanz, (2004)Abstraction and Activity in Computer-Mediated Music Production., , and . Computer Music Journal, 34 (4): 22-33 (2010)Postmodern prospects for conceptual modelling., and . APCCM, volume 53 of CRPIT, page 11-20. Australian Computer Society, (2006)Influencing users towards better passwords: persuasive cued click-points., , , and . BCS HCI (1), page 121-130. BCS, (2008)