From post

Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors.

, , и . USENIX Security Symposium, стр. 89-104. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors., , и . USENIX Security Symposium, стр. 89-104. USENIX Association, (2019)Clinical Computer Security for Victims of Intimate Partner Violence., , , , , и . USENIX Security Symposium, стр. 105-122. USENIX Association, (2019)Designing Extended Reality Guidance for Physical Caregiving Tasks., , , и . VR Workshops, стр. 419-422. IEEE, (2022)How Intention Informed Recommendations Modulate Choices: A Field Study of Spoken Word Content., , , , , , , , и . WWW, стр. 2169-2180. ACM, (2019)Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh., , , , и . ICTD, стр. 11. ACM, (2016)The Illusion of Empathy? Notes on Displays of Emotion in Human-Computer Interaction., , , , , , и . CHI, стр. 446:1-446:18. ACM, (2024)Explorable Explainable AI: Improving AI Understanding for Community Health Workers in India., , , и . CHI, стр. 399:1-399:21. ACM, (2024)"We can learn. Why not?": Designing Technologies to Engender Equity for Home Health Aides., , , и . CHI, стр. 1-14. ACM, (2020)Supporting Community Health Workers in India through Voice- and Web-Based Feedback., , , , и . CHI, стр. 2770-2781. ACM, (2017)Identity at the margins: data justice and refugee experiences with digital identity systems in Lebanon, Jordan, and Uganda., , , и . Inf. Technol. Dev., 27 (1): 13-36 (2021)