Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mark BlytheNorthumbria UniversityVerified email at northumbria.ac.uk
Virpi RotoAalto University, School of Arts, Design and ArchitectureVerified email at aalto.fi
Susan DrayDray & AssociatesVerified email at dray.com
Arnold M LundUniversity of Washington, BothellVerified email at uw.edu
Dianne MurrayHCI ConsultantVerified email at city.ac.uk
Ira WinklerExecutive Director, Human Security Engineering ConsortiumVerified email at securementem.com
Bill HefleyUniversity of Texas at DallasVerified email at utdallas.edu
Keith InstoneIBM, BGSUVerified email at instone.org
Robert B. MarkumPhD Graduate, University of Michigan - School of InformationVerified email at umich.edu
Michael MullerIBM ResearchVerified email at us.ibm.com
Marianna ObristUniversity College London, Department of Computer ScienceVerified email at ucl.ac.uk
Bow Yiying WuUniversity of SydneyVerified email at sydney.edu.au
Kentaro ToyamaUniversity of Michigan, School of InformationVerified email at umich.edu
Jessica HammerAssistant Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Nusrat Jahan MimAssistant Professor, University of TorontoVerified email at daniels.utoronto.ca
Firaz PeerAssistant Professor, University of KentuckyVerified email at uky.edu
Hawra RabaanUniversity of MarylandVerified email at umd.edu
Mohammad Rashidujjaman RifatComputer Science, University of TorontoVerified email at cs.toronto.edu
Aaron HoussianDelft University of Technology, Philips ResearchVerified email at houssian.com
Maryam MustafaLahore University of Management Sciences(LUMS)Verified email at lums.edu.pk
Follow
Elizabeth Buie
Senior User Experience Consultant, Nexer Digital
Verified email at nexergroup.com