Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The boundaries between: Parental involvement in a teen's online world., , , , , and . J. Assoc. Inf. Sci. Technol., 67 (6): 1384-1403 (2016)Synthesizing IT Case Studies of Nonprofits Using a Multiple-Level Patterns-Based Framework., , , and . IEEE Trans. Prof. Commun., 53 (3): 216-232 (2010)Evaluation, Description and Invention: Paradigms for Human-Computer Interaction.. Adv. Comput., (1989)Weak Keys and Weak Data Foiling the Two Nemeses., and . Cryptologia, 18 (3): 253-280 (1994)Designing for Independence for People with Visual Impairments., , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW1): 149:1-149:19 (2021)Coproducing Support Together: Sustainable and Reciprocal Civic Disaster Relief during COVID-19., , and . Proc. ACM Hum. Comput. Interact., 7 (CSCW1): 1-25 (April 2023)Working Together in a PhamilySpace: Facilitating Collaboration on Healthy Behaviors Over Distance., , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW1): 124:1-124:32 (2021)Teacher Collaboration in a Networked Community., , and . J. Educ. Technol. Soc., (2000)The Virtual School: An integrated collaborative environment for the classroom., , , , and . J. Educ. Technol. Soc., (2000)Why should humans trust AI?. Interactions, 29 (4): 73-77 (2022)