Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets., , , , , and . SOUPS, page 141-150. USENIX Association, (2015)Connected sustainability: connecting sustainability-driven, grass-roots communities through technology., , , , , and . C&T, page 161-163. ACM, (2015)Food for thought: designing for critical reflection on food practices., , , and . Conference on Designing Interactive Systems, page 793-794. ACM, (2012)Reflective HCI: articulating an agenda for critical practice., , and . CHI Extended Abstracts, page 1683-1686. ACM, (2006)Invited SIG - participation and HCI: why involve people in design?, , , , , , and . CHI Extended Abstracts, page 1217-1220. ACM, (2012)Text-Based On-Line Conferencing: A Conceptual and Empirical Analysis Using a Minimal Prototype., , , , , and . Human-Computer Interaction, 8 (2): 147-183 (1993)Making the Invisible Visible: Design to Support the Documentation of Participatory Arts Experiences., , , , , and . CHI, page 2583-2592. ACM, (2015)The politics and aesthetics of participatory HCI., and . Interactions, 22 (6): 26-31 (2015)Special topic: Designing for and with vulnerable people., , , , and . Interactions, 21 (1): 44-46 (2014)Editorial., , and . Personal and Ubiquitous Computing, 12 (5): 343-346 (2008)