Author of the publication

Mobile HCI 2004 Workshop on Location Systems Privacy and Control.

, , and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 525-526. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Raento, Mika
add a person with the name Raento, Mika
 

Other publications of authors with the same name

ContextContacts: re-designing SmartPhone's contact book to support mobile awareness and collaboration., , and . Mobile HCI, page 167-174. ACM, (2005)Adaptive On-Device Location Recognition., , and . Pervasive, volume 3001 of Lecture Notes in Computer Science, page 287-304. Springer, (2004)Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario., , and . ICICS, volume 4307 of Lecture Notes in Computer Science, page 302-321. Springer, (2006)The Data Subject's Right of Access and to be Informed in Finland: An Experimental Study.. I. J. Law and Information Technology, 14 (3): 390-409 (2006)Evaluating Classifiers for Mobile-Masquerader Detection., , and . SEC, volume 201 of IFIP, page 271-283. Springer, (2006)Mobile HCI 2004 Workshop on Location Systems Privacy and Control., , and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 525-526. Springer, (2004)Interpreting and Acting on Mobile Awareness Cues., , , and . Human-Computer Interaction, 22 (1-2): 97-135 (2007)Making the ordinary visible in microblogs., , , and . Personal and Ubiquitous Computing, 14 (3): 237-249 (2010)Designing for privacy and self-presentation in social awareness., and . Personal and Ubiquitous Computing, 12 (7): 527-542 (2008)ContextPhone: a prototyping platform for context-aware mobile applications., , , and . IEEE Pervasive Computing, 4 (2): 51-59 (2005)