Addressing Physical Safety, Security, and Privacy for People with Visual Impairments, SOUPS 2016, 2016. ,
Do autistic children have obsessions and compulsions?, British Journal of Clinical Psychology, vol.28, issue.3, pp.193-200, 1989. ,
DOI : 10.1111/j.2044-8260.1989.tb01369.x
The use of Internet-based communication by people with autism. Doc- toral dissertation, University of Nottingham, 2008. ,
Estimating the prevalence of Austism Spectrum Conditions in Adults: Extending the 2007 Adult Psychiatric Morbidity Survey, 2012. ,
The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults, Proceedings of the seventh annual ACM/IEEE international conference on Human-Robot Interaction, HRI '12, pp.343-350, 2012. ,
DOI : 10.1145/2157689.2157807
Parents' and Teens' Perspectives on Privacy In a Technology-Filled World, SOUPS 2014, 2014. ,
A cognitive-behavioral model of pathological Internet use, Computers in Human Behavior, vol.17, issue.2, pp.187-195, 2001. ,
DOI : 10.1016/S0747-5632(00)00041-8
Patron privacy: A luxury concern for marginalized internet users Available at https://www.ideals.illinois, IConference 2016, p.89438, 2016. ,
I'm Stuck! " : A Contextual Inquiry of People with Visual Impairments in Authentication, SOUPS 2015, pp.151-168, 2015. ,
Understanding the Experience-Centeredness of Privacy and Security Technologies, Proceedings of the 2014 workshop on New Security Paradigms Workshop, NSPW '14, pp.83-94, 2014. ,
DOI : 10.1016/j.chb.2014.04.024
The Discovery of Grounded Theory; Strategies for Qualitative Research, Nursing Research, vol.17, issue.4, p.81, 1967. ,
DOI : 10.1097/00006199-196807000-00014
My mind is a web browser: How people with autism think, Cerebrum, vol.2, issue.1, pp.14-22, 2000. ,
Examining the Contribution of Critical Visualisation to Information Security, Proceedings of the New Security Paradigms Workshop on ZZZ, NSPW '15, pp.59-72, 2015. ,
DOI : 10.1007/978-3-642-01862-6_30
Should We Design for Control, Trust or Involvement?, Proceedings of the The 15th International Conference on Interaction Design and Children, IDC '16, pp.367-378, 2016. ,
DOI : 10.1145/1978942.1979422
Investigating the use of circles in social networks to support independence of individuals with autism, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '13, pp.3207-3216, 2013. ,
DOI : 10.1145/2470654.2466439
Towards Designing Social Question-and-Answer Systems for Behavioral Support of Individuals with Autism, Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, pp.17-24, 2015. ,
DOI : 10.4108/icst.pervasivehealth.2015.259282
no one can hack my mind " : Comparing Expert and Non-Expert Security Practices Available at https, SOUPS 2015, pp.327-346, 2015. ,
Pervasive Computing and Autism: Assisting Caregivers of Children with Special Needs, IEEE Pervasive Computing, vol.6, issue.1, pp.28-3518, 2007. ,
DOI : 10.1109/MPRV.2007.18
Social Access vs. Privacy in Wearable Computing: A Case Study of Autism, IEEE Pervasive Computing, vol.14, issue.1, pp.26-33, 2015. ,
DOI : 10.1109/MPRV.2015.14
Examining the Benefit of Including a Sibling in Story-Based Interventions With a Child With Asperger Syndrome, Contemporary Issues in Communication Science & Disorders, p.41, 2014. ,
Content Analysis in Mass Communication: Assessment and Reporting of Intercoder Reliability, Human Communication Research, vol.22, issue.4, pp.587-604, 2002. ,
DOI : 10.1016/B978-012691360-6/50005-7
Some generalization and follow-up measures on autistic children in behavior therapy1, Journal of Applied Behavior Analysis, vol.6, issue.1, pp.131-165, 1973. ,
DOI : 10.1901/jaba.1973.6-131
Parent-driven use of wearable cameras for autism support, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp '12, pp.401-410, 2012. ,
DOI : 10.1145/2370216.2370277
Digital parenting: Designing children's safety, Proc. BCS-HCI, 2009. ,
Scaring and Bullying People into Security Won't Work, IEEE Security & Privacy, vol.13, issue.3, pp.80-83, 2015. ,
DOI : 10.1109/MSP.2015.65
URL : http://discovery.ucl.ac.uk/1495933/1/scare_security_ieee2np2015.pdf
EnhancedTouch, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pp.1282-1293, 2016. ,
DOI : 10.5014/ajot.61.2.190
A Smart Environment for Children with Autism, IEEE Pervasive Computing, vol.14, issue.2, pp.42-50, 2015. ,
DOI : 10.1109/MPRV.2015.22
"Counting on the Group", Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pp.3545-3558, 2016. ,
DOI : 10.1145/1183456.1183461
A field trial of privacy nudges for facebook, Proceedings of the 32nd annual ACM conference on Human factors in computing systems, CHI '14, 2014. ,
DOI : 10.1145/2556288.2557413
Folk models of home computer security, Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, 2010. ,
DOI : 10.1145/1837110.1837125
A Wearable Social Interaction Aid for Children with Autism, Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, CHI EA '16, pp.2348-2354, 2016. ,
DOI : 10.1177/1362361301005003007
"Preventative" vs. "Reactive", Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW '15, pp.302-316, 2015. ,
DOI : 10.1146/annurev.publhealth.26.021304.144357
Social and technical challenges in parenting teens' social media use, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, 2011. ,
DOI : 10.1145/1978942.1979422