Get my own profile
Co-authors
Paul DourishChancellor's Professor of Informatics, University of California, IrvineVerified email at ics.uci.edu
Jofish KayePrincipal Research ScientistVerified email at jofish.com
Geri GayProfessor of Information Science and Communication, Cornell UniversityVerified email at cornell.edu
James PierceUniversity of Washington, Design; UC Berkeley, Center for Long-Term CybersecurityVerified email at uw.edu
Maria HåkanssonAssistant professor in Applied IT, Chalmers University of TechnologyVerified email at chalmers.se
Kristina HöökRoyal Institute of Technology, CSC-school, MID-group, Mobile LifeVerified email at kth.se
Carman NeustaedterDean, Faculty of Communication, Art, and Technology, Simon Fraser UniversityVerified email at sfu.ca
Mark BlytheNorthumbria UniversityVerified email at northumbria.ac.uk
Gilly LeshedCornell UniversityVerified email at cornell.edu
Eric P. S. BaumerLehigh UniversityVerified email at lehigh.edu
Susan WycheAssociate Professor, Department of Media and Information; Michigan State UniversityVerified email at msu.edu
Simeon WarnerCornell UniversityVerified email at cornell.edu
Steve HarrisonAssociate Professor of Practice, Virginia TechVerified email at cs.vt.edu
Simon PennyProfessor, University of California IrvineVerified email at uci.edu
Deborah TatarAssociate Professor of Computer Science and, by courtesy, Psychology, Virginia TechVerified email at cs.vt.edu