Author of the publication

Diverse Migration Journeys and Security Practices: Engaging with Longitudinal Perspectives of Migration and (Digital) Security.

, , , , , , , , , , , , , , and . CHI Extended Abstracts, page 345:1-345:7. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting temporal locality in drowsy cache policies., , , and . Conf. Computing Frontiers, page 371-377. ACM, (2005)Attesting Digital Discrimination Using Norms., , and . Int. J. Interact. Multim. Artif. Intell., 6 (5): 16-23 (2021)Magentix2: A privacy-enhancing Agent Platform., , , and . Eng. Appl. Artif. Intell., 26 (1): 96-109 (2013)Exploring the viability of tie strength and tags in access controls for photo sharing., , , and . SAC, page 1082-1085. ACM, (2017)When It's Not Worth the Paper It's Written On: A Provocation on the Certification of Skills in the Alexa and Google Assistant Ecosystems., , and . CUI, page 14:1-14:5. ACM, (2022)Multiuser Privacy and Security Conflicts in the Cloud., , and . CHI, page 205:1-205:16. ACM, (2023)Towards a Value-driven Explainable Agent for Collective Privacy., , and . AAMAS, page 1937-1939. International Foundation for Autonomous Agents and Multiagent Systems, (2020)An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications., , and . AAMAS Workshops, volume 7068 of Lecture Notes in Computer Science, page 411-425. Springer, (2011)Scalable and Efficient Multiagent Platform Closer to the Operating System., , , , and . CCIA, volume 184 of Frontiers in Artificial Intelligence and Applications, page 7-15. IOS Press, (2008)A Privacy Assessment of Social Media Aggregators., , and . ASONAM, page 561-568. ACM, (2017)