Author of the publication

Clinical Computer Security for Victims of Intimate Partner Violence.

, , , , , and . USENIX Security Symposium, page 105-122. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors., , and . USENIX Security Symposium, page 89-104. USENIX Association, (2019)Clinical Computer Security for Victims of Intimate Partner Violence., , , , , and . USENIX Security Symposium, page 105-122. USENIX Association, (2019)Designing Extended Reality Guidance for Physical Caregiving Tasks., , , and . VR Workshops, page 419-422. IEEE, (2022)How Intention Informed Recommendations Modulate Choices: A Field Study of Spoken Word Content., , , , , , , , and . WWW, page 2169-2180. ACM, (2019)Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh., , , , and . ICTD, page 11. ACM, (2016)The Illusion of Empathy? Notes on Displays of Emotion in Human-Computer Interaction., , , , , , and . CHI, page 446:1-446:18. ACM, (2024)Explorable Explainable AI: Improving AI Understanding for Community Health Workers in India., , , and . CHI, page 399:1-399:21. ACM, (2024)"We can learn. Why not?": Designing Technologies to Engender Equity for Home Health Aides., , , and . CHI, page 1-14. ACM, (2020)Supporting Community Health Workers in India through Voice- and Web-Based Feedback., , , , and . CHI, page 2770-2781. ACM, (2017)Identity at the margins: data justice and refugee experiences with digital identity systems in Lebanon, Jordan, and Uganda., , , and . Inf. Technol. Dev., 27 (1): 13-36 (2021)