75 results on '"Brendan Walker"'
Search Results
2. Contesting control: journeys through surrender, self-awareness and looseness of control in embodied interaction.
3. A case for the use of cyber-systemics to combat financial crime in Australia.
4. The Guilty (Silicon) Mind: Blameworthiness and Liability in Human-Machine Teaming.
5. Discomfort - The Dark Side of Fun.
6. Demo hour.
7. Archives of Thrill: The V-Armchair Experience.
8. The Challenges of Visual-Kinaesthetic Experience.
9. Performing Research: Four Contributions to HCI.
10. Vicarious: A Flexible Framework for the Creative Use of Sensed Biodata.
11. The Megafobia V-armchair Thrill-seeking Experience for Older Audiences - An Artistic Intervention at Age UK Barnet.
12. The machine in the ghost: augmenting broadcasting with biodata.
13. Uncomfortable interactions.
14. An Examination of Cyber-Systemic Regulation in Criminology Through the Lens of 'Flows'
15. The Hacker Strikes Back: Examining the Lawfulness of 'Offensive Cyber' Under the Laws of Australia
16. Abstract Machines: Overlaying Virtual Worlds on Physical Rides.
17. Analysing the Playground: Sensitizing Concepts to Inform Systems That Promote Playful Interaction.
18. Personalizing the Theme Park: Psychometric Profiling and Physiological Monitoring.
19. The gas mask: a probe for exploring fearsome interactions.
20. Breath control of amusement rides.
21. Sequential art for science and CHI.
22. The Challenges of Using Biodata in Promotional Filmmaking.
23. The Bronco: a proof-of-concept adaptive fairground ride.
24. Performing thrill: designing telemetry systems and spectator interfaces for amusement rides.
25. Augmenting amusement rides with telemetry.
26. The drift table: designing for ludic engagement.
27. Performance-Led Research in the Wild.
28. Uncomfortable user experience.
29. An Intelligent Data Filtering Scheme for Real Time Monitoring of Physiological Traits.
30. Recommending Rides: Psychometric Profiling in the Theme Park.
31. A case for the use of cyber-systemics to combat financial crime in Australia
32. White Hat, Black Hat, Slouch Hat: Could Australia’s Military Cyber Capability be Deployed Under Commonwealth Call-Out Powers?
33. Electronic Furniture for the Curious Home: Assessing Ludic Designs in the Field.
34. Expected, sensed, and desired: A framework for designing sensing-based interaction.
35. Environmental Damage as a Threat to National Security: Australia's Legal Vulnerability to Enviro-Terrorism and Enviro-Sabotage
36. Use of Big Data Analytics by Tax Authorities
37. Cultural probes and the value of uncertainty.
38. Domestic violence as terrorism: Can control orders succeed where DV orders have failed?
39. Tax Enforcement in the Black Economy
40. Cyber-Systemics, Systemic Governance and Disruption of the Criminal Law
41. Disruption, regulatory theory and China: What surveillance and profiling can teach the modern regulator
42. Breathalising games: understanding the potential of breath control in game interfaces.
43. 'Dealing with the Drink': A Case for Reviewing Gradual Regulation of Teenagers’ Access to Alcohol
44. Performing research: four contributions to HCI
45. Q & A
46. Uncomfortable user experience
47. The challenges of using biodata in promotional filmmaking
48. Silence in the Dock
49. Use and diversion of medical marijuana among adults admitted to inpatient psychiatry
50. Personalizing the theme park: psychometric profiling and physiological monitoring
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.