Seguir
Claude Heath
Claude Heath
Dirección de correo verificada de rhul.ac.uk - Página principal
Título
Citado por
Citado por
Año
Critical visualization: a case for rethinking how we visualize risk and security
P Hall, C Heath, L Coles-Kemp
Journal of cybersecurity 1 (1), 93-108, 2015
332015
Too much information: Questioning security in a post-digital society
L Coles-Kemp, RB Jensen, CPR Heath
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
222020
Holding on to dissensus: Participatory interactions in security design.
CPR Heath, PA Hall, L Coles-Kemp
Strategic Design Research Journal 11 (2), 2018
192018
Cyber security behaviour in organisations
A Ertan, G Crossland, C Heath, D Denny, R Jensen
arXiv preprint arXiv:2004.11768, 2020
172020
Drawing as transcription: how do graphical techniques inform interaction analysis?
S Albert, C Heath, S Skach, MT Harris, M Miller, PGT Healey
Social Interaction Video-Based Studies of Human Sociality, 2019
122019
Logical Lego? Co-constructed perspectives on service design
CP Heath, L Coles-Kemp, PA Hall
Norddesign 2014: 10th Biannual NordDesign Conference-Creating Together, 416-425, 2014
112014
Relations are more than bytes: re-thinking the benefits of smart services through people and things
CPR Heath, C Crivellaro, L Coles-Kemp
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
102019
Examining the contribution of critical visualisation to information security
P Hall, C Heath, L Coles-Kemp, A Tanner
Proceedings of the 2015 New Security Paradigms Workshop, 59-72, 2015
102015
Drawing out interaction: Lines around shared space
CPR Heath
Queen Mary, University of London, 2014
82014
Protecting the vulnerable: Dimensions of assisted digital access
L Coles-Kemp, N Robinson, CPR Heath
Proceedings of the ACM on Human-Computer Interaction 6 (CSCW2), 1-26, 2022
72022
Making space for interaction: Architects design dialogues
CPR Heath, PGT Healey
Gesture and Sign Language in Human-Computer Interaction and Embodied …, 2012
52012
The navigation metaphor in security economics
W Pieters, J Barendse, M Ford, CPR Heath, CW Probst, R Verbij
IEEE Security & Privacy 14 (3), 14-21, 2016
42016
Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security
L Coles-Kemp, JW Bullée, L Montoya, M Junger, CP Heath, W Pieters, ...
42015
Clara Crivellaro, and Lizzie Coles-Kemp. 2019. Relations are more than bytes: Re-thinking the benefits of smart services through people and things
CPR Heath
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 0
4
Value-based insurance design in Louisiana: Blue Cross Blue Shield’s Zero Dollar Co-pay program
M Ford, M Liu, J Ouyang, Y Zhang, C Heath, MBA Williams, ...
The American Journal of Managed Care 26 (6), e179-e183, 2020
32020
What is Drawing?
L Gunning, C Heath, A Kingston
Black Dog Publishing, 2003
32003
Holding onto Dissensus: the participatory co-design of security
PA Hall, L Coles-Kemp, C Heath
Strategic Design Research Journal 11 (2), 2018
22018
What is drawing?: three practices explored: Lucy Gunning, Claude Heath, Rae Smith
C Heath, R Smith, A Kingston
Black Dog Pub., 2003
22003
Drawing Out the Everyday Hyper-[In] Securities of Digital Identity
CPR Heath, L Coles-Kemp
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
12022
Out of Sight, but Not Out of Mind: A Diagrammatic Conversation on Relational Drawing
CPR Heath, JG Stell
Leonardo 55 (4), 408-413, 2022
2022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20