Author of the publication

In the eye of the beholder: A visualization-based approach to information system security.

, , , , , , , , and . Int. J. Hum. Comput. Stud., 63 (1-2): 5-24 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiency: time and time again?. Interactions, 21 (2): 24-25 (2014)The social meanings of social networks: integrating SNA and ethnography of social networking.. WWW (Companion Volume), page 493-494. International World Wide Web Conferences Steering Committee / ACM, (2013)CoRgI: Cognitive Reasoning Interface., , , , , and . HCI (2), volume 10902 of Lecture Notes in Computer Science, page 398-409. Springer, (2018)Multi-source data fusion of optical satellite imagery to characterize habitat selection from wildlife tracking data., , , , , and . Ecol. Informatics, (2020)Multiple-perspective Visual Analytics for GRC Platforms., , , , and . ICEIS (3), page 41-52. SciTePress, (2017)Designing for the 'emerged' markets.. Interactions, 20 (2): 12-14 (2013)City spaces and spaces for design.. Interactions, 20 (4): 12-15 (2013)Lost in translation: a critical analysis of actors, artifacts, agendas, and arenas in participatory design.. PDC, page 162-172. ACM, (2004)Doing CSCW Research in Latin America: Differences, Opportunities, Challenges, and Lessons Learned., , , , and . CSCW Companion, page 297-302. ACM, (2015)What ideal end users teach us about collaborative software., , , and . GROUP, page 260-263. ACM, (2005)