Author of the publication

Design tactics for authentic interactive fiction: insights from alternate reality game designers.

, , , , , and . CHI, page 947-950. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

We are visible: technology-mediated social participation in a Twitter network for the homeless., and . iConference, page 492-493. ACM, (2012)Knowledge sharing, maintenance, and use in online support communities.. CHI Extended Abstracts, page 1751-1754. ACM, (2006)Pervasive Play., , , , and . CHI Extended Abstracts, page 3317-3324. ACM, (2016)Civic action brokering platforms: facilitating local engagement with ACTion Alexandria., , , , and . CSCW, page 1308-1322. ACM, (2014)Training Future Cybersecurity Professionals in Spear Phishing using SiEVE., , , and . SIGITE, page 135-140. ACM, (2018)Do You Know the Way to SNA?: A Process Model for Analyzing and Visualizing Social Media Network Data., , , , , , and . SocialInformatics, page 304-313. IEEE Computer Society, (2012)The DELAY Framework: Designing for Extended LAtencY., , , , , , , , and . CHI, page 1-13. ACM, (2020)Social Network Analysis in HCI., and . Ways of Knowing in HCI, Springer, (2014)Overhearing the crowd: an empirical examination of conversation reuse in a technical support community.. C&T, page 155-164. ACM, (2009)Design tactics for authentic interactive fiction: insights from alternate reality game designers., , , , , and . CHI, page 947-950. ACM, (2014)