Author of the publication

Diverse Migration Journeys and Security Practices: Engaging with Longitudinal Perspectives of Migration and (Digital) Security.

, , , , , , , , , , , , , , and . CHI Extended Abstracts, page 345:1-345:7. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resolving Multi-Party Privacy Conflicts in Social Media., and . IEEE Trans. Knowl. Data Eng., 28 (7): 1851-1863 (2016)IMPROVE - Identifying Minimal PROfile VEctors for Similarity Based Access Control., , and . Trustcom/BigDataSE/ISPA, page 868-875. IEEE, (2016)Who are CUIs Really For? Representation and Accessibility in the Conversational User Interface Literature., , , and . CUI, page 26:1-26:5. ACM, (2023)Diverse Migration Journeys and Security Practices: Engaging with Longitudinal Perspectives of Migration and (Digital) Security., , , , , , , , , and 5 other author(s). CHI Extended Abstracts, page 345:1-345:7. ACM, (2023)Legal Obligation and Ethical Best Practice: Towards Meaningful Verbal Consent for Voice Assistants., , and . CHI, page 166:1-166:16. ACM, (2023)A Secure Group-Oriented Framework for Intelligent Virtual Environments., , , and . Comput. Informatics, 30 (6): 1225-1246 (2011)The Challenges with Internet of Things for Business., , and . CoRR, (2020)Smart Home Personal Assistants: A Security and Privacy Review., , and . ACM Comput. Surv., 53 (6): 116:1-116:36 (2021)Automated GDPR compliance assessment for cross-border personal data transfers in android applications., , , and . Comput. Secur., (2023)The Challenges with Internet of Things Security for Business., , and . NEW2AN/ruSMART, volume 13158 of Lecture Notes in Computer Science, page 46-58. Springer, (2021)