Critical visualization: a case for rethinking how we visualize risk and security P Hall, C Heath, L Coles-Kemp Journal of cybersecurity 1 (1), 93-108, 2015 | 33 | 2015 |
Too much information: Questioning security in a post-digital society L Coles-Kemp, RB Jensen, CPR Heath Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 23 | 2020 |
Holding on to dissensus: Participatory interactions in security design. CPR Heath, PA Hall, L Coles-Kemp Strategic Design Research Journal 11 (2), 2018 | 19 | 2018 |
Cyber security behaviour in organisations A Ertan, G Crossland, C Heath, D Denny, R Jensen arXiv preprint arXiv:2004.11768, 2020 | 17 | 2020 |
Drawing as transcription: how do graphical techniques inform interaction analysis? S Albert, C Heath, S Skach, MT Harris, M Miller, PGT Healey Social Interaction Video-Based Studies of Human Sociality, 2019 | 12 | 2019 |
Logical Lego? Co-constructed perspectives on service design CP Heath, L Coles-Kemp, PA Hall Norddesign 2014: 10th Biannual NordDesign Conference-Creating Together, 416-425, 2014 | 11 | 2014 |
Protecting the vulnerable: Dimensions of assisted digital access L Coles-Kemp, N Robinson, CPR Heath Proceedings of the ACM on Human-Computer Interaction 6 (CSCW2), 1-26, 2022 | 10 | 2022 |
Relations are more than bytes: re-thinking the benefits of smart services through people and things CPR Heath, C Crivellaro, L Coles-Kemp Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 10 | 2019 |
Examining the contribution of critical visualisation to information security P Hall, C Heath, L Coles-Kemp, A Tanner Proceedings of the 2015 New Security Paradigms Workshop, 59-72, 2015 | 10 | 2015 |
Drawing out interaction: Lines around shared space CPR Heath Queen Mary, University of London, 2014 | 8 | 2014 |
Making space for interaction: Architects design dialogues CPR Heath, PGT Healey Gesture and Sign Language in Human-Computer Interaction and Embodied …, 2012 | 5 | 2012 |
The navigation metaphor in security economics W Pieters, J Barendse, M Ford, CPR Heath, CW Probst, R Verbij IEEE Security & Privacy 14 (3), 14-21, 2016 | 4 | 2016 |
Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security L Coles-Kemp, JW Bullée, L Montoya, M Junger, CP Heath, W Pieters, ... | 4 | 2015 |
Clara Crivellaro, and Lizzie Coles-Kemp. 2019. Relations are more than bytes: Re-thinking the benefits of smart services through people and things CPR Heath Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 0 | 4 | |
Value-based insurance design in Louisiana: Blue Cross Blue Shield’s Zero Dollar Co-pay program M Ford, M Liu, J Ouyang, Y Zhang, C Heath, MBA Williams, ... The American Journal of Managed Care 26 (6), e179-e183, 2020 | 3 | 2020 |
What is Drawing? L Gunning, C Heath, A Kingston Black Dog Publishing, 2003 | 3 | 2003 |
Holding onto Dissensus: the participatory co-design of security PA Hall, L Coles-Kemp, C Heath Strategic Design Research Journal 11 (2), 2018 | 2 | 2018 |
What is drawing?: three practices explored: Lucy Gunning, Claude Heath, Rae Smith C Heath, R Smith, A Kingston Black Dog Pub., 2003 | 2 | 2003 |
Drawing Out the Everyday Hyper-[In] Securities of Digital Identity CPR Heath, L Coles-Kemp Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022 | 1 | 2022 |
Out of Sight, but Not Out of Mind: A Diagrammatic Conversation on Relational Drawing CPR Heath, JG Stell Leonardo 55 (4), 408-413, 2022 | | 2022 |