Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Ben MatthewsThe University of QueenslandVerified email at uq.edu.au
- Stephen SnowCSIROVerified email at uq.edu.au
- Mashhuda GlencrossUniversity of QueenslandVerified email at uq.edu.au
- Stephen VillerSchool of Electrical Engineering & Computer Science, University of QueenslandVerified email at acm.org
- Paul SchlosserPhD candidate, The University of QueenslandVerified email at uq.edu.au
- Isaac SalisburyVerified email at uq.edu.au
- Jonna HakkilaProfessor, University of LaplandVerified email at ulapland.fi
- Sarah MatthewsQueensland University of Technology (QUT)Verified email at qut.edu.au
- Richard GomerUniversity of SouthamptonVerified email at soton.ac.uk
- James PierceUniversity of Washington, Design; UC Berkeley, Center for Long-Term CybersecurityVerified email at uw.edu
- Ewa LugerChair of Human-Data Interaction, University of EdinburghVerified email at exseed.ed.ac.uk
- Peter WorthyUniversity of QueenslandVerified email at uq.edu.au
- Marie BodenThe University of QueenslandVerified email at itee.uq.edu.au
- Alexander BalsonThe University of QueenslandVerified email at uq.edu.au
- Chunnan (Nan) ZhengThe University of New South Wales, AustraliaVerified email at unsw.edu.au
- George Edward TorrensLoughborough Design School, Loughborough UniversityVerified email at lboro.ac.uk
- Ian StorerSenior Lecturer in Industrial/Product Design, Aston UniversityVerified email at aston.ac.uk
- Hong LIUniversity of OsloVerified email at ifi.uio.no
- Ian StorerLoughborough Design School, Loughborough UniversityVerified email at lboro.ac.uk