Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ben MatthewsThe University of QueenslandVerified email at uq.edu.au
Stephen SnowCSIROVerified email at uq.edu.au
Mashhuda GlencrossUniversity of QueenslandVerified email at uq.edu.au
Stephen VillerSchool of ITEE, University of QueenslandVerified email at acm.org
Paul SchlosserPhD candidate, The University of QueenslandVerified email at uq.edu.au
Isaac SalisburyVerified email at uq.edu.au
Jonna HakkilaProfessor, University of LaplandVerified email at ulapland.fi
Sarah MatthewsQueensland University of Technology (QUT)Verified email at qut.edu.au
Richard GomerUniversity of SouthamptonVerified email at soton.ac.uk
James PierceUniversity of Washington, Design; UC Berkeley, Center for Long-Term CybersecurityVerified email at uw.edu
Ewa LugerChair of Human-Data Interaction, University of EdinburghVerified email at exseed.ed.ac.uk
Peter WorthyUniversity of QueenslandVerified email at uq.edu.au
Marie BodenThe University of QueenslandVerified email at itee.uq.edu.au
Alexander BalsonThe University of QueenslandVerified email at uq.edu.au
Chunnan (Nan) ZhengThe University of New South Wales, AustraliaVerified email at unsw.edu.au
George Edward TorrensLoughborough Design School, Loughborough UniversityVerified email at lboro.ac.uk
Ian StorerSenior Lecturer in Industrial/Product Design, Aston UniversityVerified email at aston.ac.uk
Hong LIUniversity of OsloVerified email at ifi.uio.no
Ian StorerLoughborough Design School, Loughborough UniversityVerified email at lboro.ac.uk