Author of the publication

Use-Centered Interface Design for an Adaptable Administration System for Chemical Process Design

, , , and . Human-Computer Interaction: Theory and Practice : Proceedings of HCI International 2003 (Crete 2003), page 365–369. Mahwah, Erlbaum, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Task and Information Modeling for Cooperative Work, , , , and . Systems, Social and Internationalization Design Aspects of Human-Computer Interaction: Proceedings of the HCI International 2001 (New Orleans 2001), page 172–176. Mahwah, Erlbaum, (2001)Use-Centered Interface Design for an Adaptable Administration System for Chemical Process Design, , , and . Human-Computer Interaction: Theory and Practice : Proceedings of HCI International 2003 (Crete 2003), page 365–369. Mahwah, Erlbaum, (2003)Not Seeing the Woods for the Trees - Empirical Studies in Engineering Design, , and . Workshop on the Role of Empirical Studies in Understanding and Supporting Engineering Design (Gaithersburg 2002), page 1–7. Gaithersburg, (2002)Representing Knowledge for Chemical Process Design Using an Abstraction-Decomposition Space, , and . Proceedings of the 6th International Conference on Work With Display Units (Berchtesgaden 2002), page 618–620. Berlin, Ergonomic Institut für Arbeits- und Sozialforschung Forschungsgesellschaft mbH, (2002)Piracy, computer crime, and IS misuse at the university., , and . Commun. ACM, 49 (6): 84-90 (2006)An Empirical Investigation of Factors that Influence Individual Behavior toward Changing Social Networking Security Settings., , and . J. Theor. Appl. Electron. Commer. Res., 11 (2): 1-15 (2016)Mobile users' information privacy concerns instrument and IoT., and . Inf. Comput. Secur., 28 (3): 359-371 (2020)Cyberterrorism, computer crime, and reality.. Inf. Manag. Comput. Secur., 12 (2): 154-166 (2004)Learning styles of information technology students., and . SIGITE Conference, page 313-314. ACM, (2011)Why users (fail to) read computer usage policies., , and . Ind. Manag. Data Syst., 108 (6): 701-712 (2008)