Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyVerified email at berkeley.edu
Joseph LindleyLancaster UniversityVerified email at lancaster.ac.uk
James PierceUniversity of Washington, Design; UC Berkeley, Center for Long-Term CybersecurityVerified email at uw.edu
Tim KorjakowFraunhofer Heinrich Hertz Institute , Technische Universität BerlinVerified email at campus.tu-berlin.de
Christoph KinkeldeyUniversity of Applied Sciences HamburgVerified email at haw-hamburg.de
David Philip GreenUK Centre for Ecology and HydrologyVerified email at ceh.ac.uk
Michael HeidtChemnitz University of TechnologyVerified email at informatik.tu-chemnitz.de
Heidi BiggsAssistant Professor, School of Literature, Media, and Communication, Georgia TechVerified email at gatech.edu
Patricia CornelioUltraleapVerified email at ultraleap.com
Emanuela MaggioniPostdoctoral Research Fellow, UCLIC, University College LondonVerified email at ucl.ac.uk
Marianna ObristUniversity College London, Department of Computer ScienceVerified email at ucl.ac.uk
Giada BrianzaUCL, University College LondonVerified email at ucl.ac.uk
Vasiliki TsaknakiAssociate Professor in Human-Computer Interaction, IT University of CopenhagenVerified email at itu.dk
Mathias FunkEindhoven University of TechnologyVerified email at tue.nl
William OdomAssociate Professor, School of Interactive Arts + Technology at Simon Fraser UniversityVerified email at sfu.ca
Matthew Lee-SmithSchool of Design and Creative Arts, Loughborough UniversityVerified email at lboro.ac.uk
Doenja OogjesIndustrial Design, Eindhoven University of TechnologyVerified email at tue.nl
Pedro SanchesUmeå University and ITI/LARSySVerified email at umu.se
Audrey DesjardinsUniversity of Washington, School of Art + Art History + DesignVerified email at uw.edu
Jonas OppenlaenderUniversity of OuluVerified email at oulu.fi