Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Epilogue: Where the action was, wasn't, should have been, and might yet be.. ACM Trans. Comput. Hum. Interact., 20 (1): 2:1-2:4 (2013)User experience as legitimacy trap.. Interactions, 26 (6): 46-49 (2019)Seeking the source: software source code as a social and technical artifact., , and . GROUP, page 197-206. ACM, (2005)Process descriptions as organisational accounting devices: the dual use of workflow technologies.. GROUP, page 52-60. ACM, (2001)"Resistance is futile": reading science fiction alongside ubiquitous computing., and . Personal and Ubiquitous Computing, 18 (4): 769-778 (2014)Back to the shed: gendered visions of technology and domesticity., and . Personal and Ubiquitous Computing, 11 (5): 373-381 (2007)Implication for Desich. Montréal, Canada, ACM, (2006)A Divergence-Based Model of Synchrony and Distribution in Collaborative Systems. Rank Xerox Research Centre, Cambridge Laboratory, Cambridge, UK, (1994)Portholes: Supporting Awareness in a Distributed Group, and . Proc. Conf. on Human Factors in Computing Systems (CHI), (1992)Special issue on science fiction and ubiquitous computing., and . Personal and Ubiquitous Computing, 18 (4): 765-766 (2014)