Author of the publication

Security in context: investigating the impact of context on attitudes towards biometric technology.

, , , and . BCS HCI, page 108-116. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security in context: investigating the impact of context on attitudes towards biometric technology., , , and . BCS HCI, page 108-116. ACM, (2010)Fingers, veins and the grey pound: accessibility of biometric technology., , and . ECCE, volume 250 of ACM International Conference Proceeding Series, page 149-152. ACM, (2007)Usability Challenges in Emerging Markets., , and . ICEIS (5), page 160-165. (2008)A simple dual-RAMP algorithm for resource constraint project scheduling., , and . ACM Southeast Regional Conference, page 67. ACM, (2010)Perfectly Balanced Allocation., , and . RANDOM-APPROX, volume 2764 of Lecture Notes in Computer Science, page 240-251. Springer, (2003)Drawing Graphs with Large Vertices and Thick Edges., , and . WADS, volume 2748 of Lecture Notes in Computer Science, page 281-293. Springer, (2003)Drawing Planar Graphs with Large Vertices and Thick Edges., , and . J. Graph Algorithms Appl., (2004)Survivable Monitoring in Dynamic Networks., , and . IWIA, page 33-47. (2004)Culture & biometrics: regional differences in the perception of biometric authentication technologies., , , and . AI Soc., 24 (3): 295-306 (2009)Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems., , , and . INTERACT (2), volume 5727 of Lecture Notes in Computer Science, page 293-305. Springer, (2009)