Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing integration work in an NHS electronic patient record (EPR) project., , and . Health Informatics J., 13 (1): 47-56 (2007)Models and Patterns of Trust., , , , , , , and . CSCW, page 328-338. ACM, (2015)Telecare Call Centre Work and Ageing in Place., , , , , and . Comput. Support. Cooperative Work., 25 (1): 79-105 (2016)Designing with users for domestic environments: methods - challenges - lessons learned., , , , , and . CSCW Companion, page 335-338. ACM, (2014)Domain crossing: how much expertise is enough?, , , , , , , and . CSCW (Companion), page 29-32. ACM, (2012)Threat awareness for critical infrastructures resilience., , , , , and . RNDM, page 196-202. IEEE, (2016)“How Many Bloody Examples Do You Want?” Fieldwork and Generalisation, , and . ECSCW 2013: Proceedings of the 13th European Conference on Computer Supported Cooperative Work, 21-25 September 2013, Paphos, Cyprus, page 1--20. Springer, (2013)'Safety in numbers': calculation and document re-use in knowledge work., , , and . GROUP, page 242-251. ACM, (2001)Making Tacit Requirements Explicit., , , , , , , , and . MARK@RE, page 40-44. IEEE Computer Society, (2009)Unpacking Tacit Knowledge for Requirements Engineering., , , , , , , , , and 1 other author(s). Managing Requirements Knowledge, Springer, (2013)