Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

We are visible: technology-mediated social participation in a Twitter network for the homeless., and . iConference, page 492-493. ACM, (2012)Training Future Cybersecurity Professionals in Spear Phishing using SiEVE., , , and . SIGITE, page 135-140. ACM, (2018)Knowledge sharing, maintenance, and use in online support communities.. CHI Extended Abstracts, page 1751-1754. ACM, (2006)Pervasive Play., , , , and . CHI Extended Abstracts, page 3317-3324. ACM, (2016)Do You Know the Way to SNA?: A Process Model for Analyzing and Visualizing Social Media Network Data., , , , , , and . SocialInformatics, page 304-313. IEEE Computer Society, (2012)Civic action brokering platforms: facilitating local engagement with ACTion Alexandria., , , , and . CSCW, page 1308-1322. ACM, (2014)The DELAY Framework: Designing for Extended LAtencY., , , , , , , , and . CHI, page 1-13. ACM, (2020)Social Network Analysis in HCI., and . Ways of Knowing in HCI, Springer, (2014)Overhearing the crowd: an empirical examination of conversation reuse in a technical support community.. C&T, page 155-164. ACM, (2009)Alternate Reality Games: Platforms for Collaborative Learning., , , , , , and . ICLS, International Society of the Learning Sciences, (2012)