Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Models and Patterns of Trust., , , , , , , and . CSCW, page 328-338. ACM, (2015)Barter: A Technology Strategy for Local Wealth Generation., , , and . IT Prof., 16 (3): 28-34 (2014)Accounting for Dynamic Diversity Among Child Users of IoT., , , and . IEEE Pervasive Comput., 19 (1): 43-51 (2020)Growing Up With Pervasive Computing., , , and . IEEE Pervasive Comput., 19 (1): 8-9 (2020)A Scenario-Based Methodology for Exploring Risks: Children and Programmable IoT., , , , and . Conference on Designing Interactive Systems, page 751-761. ACM, (2019)Exploring (un)sustainable growth of digital technologies in the home., , , , , and . EnviroInfo/ICT4S (1), page 300-309. Atlantis Press, (2015)A sustainable HCI knowledge base in progress., and . Interactions, 23 (3): 74-76 (2016)Systems thinking and efficiency under emissions constraints: Addressing rebound effects in digital innovation and policy., , , , , , , , , and 9 other author(s). Patterns, 4 (2): 100679 (February 2023)Wicked Persuasion: A Designerly Approach., , , and . PERSUASIVE, volume 8462 of Lecture Notes in Computer Science, page 137-142. Springer, (2014)Designing a Mobile Service as a Facilitator for Capturing Local Trade Data., , , , , and . MindTrek, page 172. ACM, (2013)