Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Produktive Wissensarbeit(er): Antworten auf die Management-Herausforderung des 21. Jahrhunderts ; mit vielen Fallbeispielen ; Performance messen, Produktivität steigern, Wissensarbeiter entwickeln, , and . Gabler, Wiesbaden, 1. Aufl. edition, (2008)Virtual Reality Technology Assisting Communication Apprehension., , , and . CGVR, page 112-113. CSREA Press, (2008)Investigation of Computer Security and Ethics Awareness in University Environment., , , , , and . Security and Management, page 17-21. CSREA Press, (2009)A new curriculum for hardware-based network intrusion detection., , , and . ACM Southeast Regional Conference, page 318-319. ACM, (2011)Defining the role of common variation in the genomic and biological architecture of adult human height, , , , , , , , , and 794 other author(s). Nat. Genet., 46 (11): 1173--1186 (November 2014)A Comparative Study of Sense of Presence of Traditional Virtual Reality and Immersive Environments., and . Australas. J. Inf. Syst., (2016)Dynamic Immersive Visualisation Environments: Enhancing Pedagogical Techniques., and . Australas. J. Inf. Syst., (2019)A brief study of information security and ethics awareness as an imperative component of management information systems., , and . ACM Southeast Regional Conference, page 515-516. ACM, (2007)Computer security and ethics awareness in university environments: a challenge for management of information systems., , and . ACM Southeast Regional Conference, page 434-439. ACM, (2006)An Information Exploration and Visualization Approach for Direct Manipulation of Databases., and . VCHCI, volume 733 of Lecture Notes in Computer Science, page 417-418. Springer, (1993)