Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A holistic approach to supporting distance learning using the Internet: transformation, nottranslation., , , and . BJET, 29 (2): 149-161 (1998)Teaching cybersecurity at a distance., , and . Inroads, 3 (4): 20-21 (2012)Understanding the social practice of EV workplace charging., and . UbiComp/ISWC Adjunct, page 1133-1141. ACM, (2015)Personal informatics for non-geeks: lessons learned from ordinary people., , , , and . UbiComp Adjunct, page 683-686. ACM, (2014)Harvesting green miles from my roof: an investigation into self-sufficient mobility with electric vehicles., , , , , , and . UbiComp, page 1065-1076. ACM, (2015)Privacy arguments: Analysing selective disclosure requirements for mobile applications., , , , , , and . RE, page 131-140. IEEE Computer Society, (2012)In the best families: tracking and relationships., , , , , , , and . CHI, page 2419-2428. ACM, (2011)The case for Zero Trust Digital Forensics., , , and . CoRR, (2022)Data, Data Everywhere, and Still Too Hard to Link: Insights from User Interactions with Diabetes Apps., , , and . CHI, page 503. ACM, (2018)Complexity Science and Representation in Robot Soccer., and . RoboCup, volume 3020 of Lecture Notes in Computer Science, page 67-76. Springer, (2003)