Author of the publication

Diverse Migration Journeys and Security Practices: Engaging with Longitudinal Perspectives of Migration and (Digital) Security.

, , , , , , , , , , , , , , and . CHI Extended Abstracts, page 345:1-345:7. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Balancing Power Dynamics in Smart Homes: Nannies' Perspectives on How Cameras Reflect and Affect Relationships., , , and . SOUPS @ USENIX Security Symposium, page 687-706. USENIX Association, (2022)"My Best Friend's Husband Sees and Knows Everything": A Cross-Contextual and Cross-Country Approach to Understanding Smart Home Privacy., , , , , , , , , and . Proc. Priv. Enhancing Technol., 2024 (4): 413-449 (2024)Bystanders' Privacy: The Perspectives of Nannies on Smart Home Surveillance., , and . FOCI @ USENIX Security Symposium, USENIX Association, (2020)Diverse Migration Journeys and Security Practices: Engaging with Longitudinal Perspectives of Migration and (Digital) Security., , , , , , , , , and 5 other author(s). CHI Extended Abstracts, page 345:1-345:7. ACM, (2023)Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras., , , and . SOUPS @ USENIX Security Symposium, page 185-204. USENIX Association, (2020)Designing user-centered privacy-enhancing technologies. University College London (University of London), UK, (2020)British Library, EThOS.Exploring Privacy Practices of Female mHealth Apps in a Post-Roe World., , , , and . CHI, page 576:1-576:24. ACM, (2024)Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study., , , , and . CHI Extended Abstracts, page 1-9. ACM, (2020)Evaluating the End-User Experience of Private Browsing Mode., and . CHI, page 1-12. ACM, (2020)Exploring User Mental Models of End-to-End Encrypted Communication Tools., , , and . FOCI @ USENIX Security Symposium, USENIX Association, (2018)