Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Work of Intrusion Detection: Rethinking the Role of Security Analysts., , and . AMCIS, page 179. Association for Information Systems, (2004)Motivating Cybersecurity Advocates: Implications for Recruitment and Retention., and . SIGMIS-CPR, page 109-117. ACM, (2019)Shifting Expectations: Understanding Youth Employees' Handoffs in a 3D Print Shop., , , and . Proc. ACM Hum. Comput. Interact., 2 (CSCW): 47:1-47:23 (2018)Simon's Anthill: Mapping and Navigating Belief Spaces., , and . CoRR, (2018)From Compliance to Impact: Tracing the Transformation of an Organizational Security Awareness Program., and . CoRR, (2023)Understanding situated action in ludic ecologies., , and . C&T, page 100-109. ACM, (2013)Preserving the Big Picture: Visual Network Traffic Analysis with TN., , , and . VizSEC, page 6. IEEE Computer Society, (2005)Opening up the black box of scholarly synthesis: Intermediate products, processes, and tools., , , and . ASIST, volume 57 of Proc. Assoc. Inf. Sci. Technol., Wiley, (2020)A user-centered approach to visualizing network traffic for intrusion detection., , , , and . CHI Extended Abstracts, page 1403-1406. ACM, (2005)Why use memo for all?: restructuring mobile applications to support informal note taking., , and . CHI Extended Abstracts, page 1320-1323. ACM, (2005)