Get my own profile
Public access
View all87 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Marina JirotkaUniversity of OxfordVerified email at cs.ox.ac.uk
Damian Okaibedi EkeUniversity of NottinghamVerified email at nottingham.ac.uk
Kutoma WakunumaDe Montfort UniversityVerified email at dmu.ac.uk
Inga UlnicaneUniversity of CambridgeVerified email at cam.ac.uk
Grace EdenUniversity of TartuVerified email at ut.ee
Mark J RyanWageningen University and ResearchVerified email at wur.nl
Job TimmermansNetherlands Defense AcademyVerified email at mindef.nl
Catherine FlickProfessor of Ethics and Games Technology, Staffordshire UniversityVerified email at staffs.ac.uk
Kevin MacnishSopra SteriaVerified email at soprasteria.com
Simisola AkintoyeDe Montfort UniversityVerified email at dmu.ac.uk
Laurence BrooksUniversity of SheffieldVerified email at sheffield.ac.uk
Alexander BremUniversity of Stuttgart, University of Southern DenmarkVerified email at eni.uni-stuttgart.de
Stephen RaineyAssistant Professor in Philosophy and technology, University of DelftVerified email at tudelft.nl
Helena WebbUniversity of NottinghamVerified email at nottingham.ac.uk
Veikko IkonenVTT Technical Research Centre of Finland LtdVerified email at vtt.fi
George OgohSenior Research Fellow, University of NottinghamVerified email at nottingham.ac.uk
Simon RogersonProfessor Emeritus, Centre for Computing and Social Responsiblity, De Montfort UniversityVerified email at dmu.ac.uk
David WrightTrilateral ResearchVerified email at trilateralresearch.com
Tonii LeachDepartment of Information Security, Royal Holloway University of LondonVerified email at rhul.ac.uk
Yingqin ZhengEssex Business SchoolVerified email at essex.ac.uk