Author of the publication

"Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia.

, , , , , , , , and . SOUPS @ USENIX Security Symposium, page 127-142. USENIX Association, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The CareNet Display: Lessons Learned from an In Home Evaluation of an Ambient Display., , and . UbiComp, volume 3205 of Lecture Notes in Computer Science, page 1-17. Springer, (2004)The Drop: pragmatic problems in the design of a compelling, pervasive game., , and . Computers in Entertainment, 3 (3): 4 (2005)"She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households., , , , , and . CHI, page 5921-5932. ACM, (2016)Theory-driven design strategies for technologies that support behavior change in everyday life., , and . CHI, page 405-414. ACM, (2009)Designing Toxic Content Classification for a Diversity of Perspectives., , , , , , , and . SOUPS @ USENIX Security Symposium, page 299-318. USENIX Association, (2021)Conducting In Situ Evaluations for and With Ubiquitous Computing Technologies., , , , , , and . Int. J. Hum. Comput. Interaction, 22 (1&2): 103-118 (2007)Using Multi-modal Sensing for Human Activity Modeling in the Real World., , and . Handbook of Ambient Intelligence and Smart Environments, Springer, (2010)Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning., , , and . SOUPS, page 113-128. USENIX Association, (2014)Some Assembly Required: Supporting End-User Sensor Installation in Domestic Ubiquitous Computing Environments., , and . UbiComp, volume 3205 of Lecture Notes in Computer Science, page 107-124. Springer, (2004)Security and Privacy Experiences and Practices of Survivors of Intimate Partner Abuse., , , , , , , , and . IEEE Secur. Priv., 15 (5): 76-81 (2017)