Critical visualization: a case for rethinking how we visualize risk and security P Hall, C Heath, L Coles-Kemp Journal of cybersecurity 1 (1), 93-108, 2015 | 40 | 2015 |
Too much information: Questioning security in a post-digital society L Coles-Kemp, RB Jensen, CPR Heath Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 28 | 2020 |
Holding on to dissensus: Participatory interactions in security design. CPR Heath, PA Hall, L Coles-Kemp Strategic Design Research Journal 11 (2), 2018 | 22 | 2018 |
Cyber security behaviour in organisations A Ertan, G Crossland, C Heath, D Denny, R Jensen arXiv preprint arXiv:2004.11768, 2020 | 20 | 2020 |
Drawing as transcription: how do graphical techniques inform interaction analysis? S Albert, C Heath, S Skach, MT Harris, M Miller, PGT Healey Social Interaction Video-Based Studies of Human Sociality, 2019 | 15 | 2019 |
Logical Lego? Co-constructed perspectives on service design CP Heath, L Coles-Kemp, PA Hall Norddesign 2014: 10th Biannual NordDesign Conference-Creating Together, 416-425, 2014 | 15 | 2014 |
Relations are more than bytes: re-thinking the benefits of smart services through people and things CPR Heath, C Crivellaro, L Coles-Kemp Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 12 | 2019 |
Examining the contribution of critical visualisation to information security P Hall, C Heath, L Coles-Kemp, A Tanner Proceedings of the 2015 New Security Paradigms Workshop, 59-72, 2015 | 12 | 2015 |
Protecting the vulnerable: Dimensions of assisted digital access L Coles-Kemp, N Robinson, CPR Heath Proceedings of the ACM on Human-Computer Interaction 6 (CSCW2), 1-26, 2022 | 11 | 2022 |
Drawing out interaction: Lines around shared space CPR Heath Queen Mary, University of London, 2014 | 8 | 2014 |
Virtual production: A global innovation opportunity for the UK J Bennett, C Heath, F Kilkelly, P Richardson StoryFutures Academy Immersive Skills Report, 2021 | 7 | 2021 |
Drawing out the everyday hyper-[In] securities of digital identity CPR Heath, L Coles-Kemp Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022 | 6 | 2022 |
The navigation metaphor in security economics W Pieters, J Barendse, M Ford, CPR Heath, CW Probst, R Verbij IEEE Security & Privacy 14 (3), 14-21, 2016 | 5 | 2016 |
Making space for interaction: Architects design dialogues CPR Heath, PGT Healey International Gesture Workshop, 250-261, 2011 | 5 | 2011 |
What is Drawing? L Gunning, C Heath, A Kingston Black Dog Publishing, 2003 | 5* | 2003 |
Value-based insurance design in Louisiana: Blue Cross Blue Shield’s Zero Dollar Co-pay program M Ford, M Liu, J Ouyang, Y Zhang, C Heath, MBA Williams, ... The American Journal of Managed Care 26 (6), e179-e183, 2020 | 4 | 2020 |
Technology-supported risk estimation by predictive assessment of socio-technical security L Coles-Kemp, JW Bullée, L Montoya, M Junger, CP Heath, W Pieters, ... Trespass Project, 2015 | 4 | 2015 |
Clara Crivellaro, and Lizzie Coles-Kemp. 2019. Relations are more than bytes: Re-thinking the benefits of smart services through people and things CPR Heath Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 0 | 4 | |
Virtual production skills report 2023 J Bennett, C Heath, F Kilkelly, P Richardson StoryFutures Virtual Production Skills Report, 2023 | 3 | 2023 |
Holding onto Dissensus: the participatory co-design of security PA Hall, L Coles-Kemp, C Heath Strategic Design Research Journal 11 (2), 2018 | 2 | 2018 |