Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring cognitive bias 'in the wild': technical perspective.. Commun. ACM, 65 (4): 114 (2022)Cognitive Dimensions of Notations: Design Tools for Cognitive Technology., , , , , , , , , and 4 other author(s). Cognitive Technology, volume 2117 of Lecture Notes in Computer Science, page 325-341. Springer, (2001)The benefits and challenges of using crowdfunding to facilitate community-led projects in the context of digital civics., , , , , , , , , and . Int. J. Hum. Comput. Stud., (2020)IT in Society: a Multi-Disciplinary Course, and . IEEE Frontiers in Education conference, (1999)Tactile Stories: Interactive E-textile Wall-hangings created by blind and visually impaired makers., , and . NordiCHI, page 120:1-120:3. ACM, (2020)A glimpse of expert programmers' mental imagery., and . ESP, page 109-123. ACM, (1997)The Case for Adaptive Security Interventions., , , , , , , , , and 1 other author(s). ACM Trans. Softw. Eng. Methodol., 31 (1): 9:1-9:52 (2022)Bumps in the Code: Error Handling During Software Development., , , and . IEEE Softw., 38 (3): 26-34 (2021)Security in Online Freelance Software Development: A case for Distributed Security Responsibility., , , , and . CoRR, (2023)Security Thinking in Online Freelance Software Development., , , , and . ICSE (SEIS), page 13-24. IEEE, (2023)