Author of the publication

From V2X to Control2Trust - Why Trust and Control Are Major Attributes in Vehicle2X Technologies.

, , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 570-581. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What happens when decision support systems fail? - the importance of usability on performance in erroneous systems., , , and . Behav. Inf. Technol., 38 (12): 1225-1242 (2019)Privacy Pirates - The Key Role of User Diversity in V2X-Technology., , and . HCI (17), volume 10917 of Lecture Notes in Computer Science, page 255-267. Springer, (2018)Should I Stay or Should I Go? - Influencing Context Factors for Users' Decisions to Charge or Refuel Their Vehicles., , , , , and . AHFE (13), volume 964 of Advances in Intelligent Systems and Computing, page 573-584. Springer, (2019)Trust in Autonomous Technologies - A Contextual Comparison of Influencing User Factors., , , and . HCI (29), volume 11594 of Lecture Notes in Computer Science, page 371-384. Springer, (2019)Watch Out! - User-Centered Feedback Design for a V2X-Smartphone App., , , and . HCI (17), volume 10287 of Lecture Notes in Computer Science, page 365-383. Springer, (2017)Semi-charmed Life - Willingness to Use and Related Contributing Factors Regarding Semi-public Charging Infrastructure for Electric Cars., , , , and . AHFE (12), volume 1212 of Advances in Intelligent Systems and Computing, page 340-353. Springer, (2020)The Way You Do Things You Do - Fueling or Charging Cars as Dealing with Refillable Resources., , and . AHFE (12), 270, page 255-268. Springer, (2021)User Diverse Privacy Requirements for V2X-Technology - Quantitative Research on Context-based Privacy Aspects., , and . VEHITS, page 60-67. SciTePress, (2016)Share to Protect - Quantitative Study on Privacy Issues in V2X-Technology., , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 152-163. Springer, (2016)Dos and Don'ts of Datasharing in V2X-Technology - User Diverse Perspectives in Different Traffic Scenarios., , and . SMARTGREENS/VEHITS (Selected Papers), volume 738 of Communications in Computer and Information Science, page 257-274. Springer, (2016)