From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Defining, Designing, and Evaluating Peripheral Displays: An Analysis Using Activity Theory., , и . Human-Computer Interaction, 22 (1-2): 221-261 (2007)Evaluating non-speech sound visualizations for the deaf., , , и . Behav. Inf. Technol., 25 (4): 333-351 (2006)Evaluating Peripheral Displays., , и . Awareness Systems, Springer, (2009)Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy., , , , , , , , и . CHI, стр. 89. ACM, (2019)Toward Gender-Equitable Privacy and Security in South Asia., , , , , , , , , и . IEEE Secur. Priv., 17 (4): 71-77 (2019)"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns., , , , , и . USENIX Security Symposium, стр. 1181-1198. USENIX Association, (2021)How do designers and user experience professionals actually perceive and use personas?, , и . CHI, стр. 1219-1228. ACM, (2012)Goals and perceived success of online enterprise communities: what is important to leaders & members?, , , , , , и . CHI, стр. 291-300. ACM, (2014)What Are You Working On? Status Message Q&A in an Enterprise SNS., , , , и . ECSCW, стр. 313-332. Springer, (2011)"Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia., , , , , , , , и . SOUPS @ USENIX Security Symposium, стр. 127-142. USENIX Association, (2018)