Author of the publication

The Unwritten Rules of PhD Research (Open Up Study Skills)

, and . Open University Press, 2. edition, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Schrödinger's security: opening the box on app developers' security rationale., , , , , , , and . ICSE, page 149-160. ACM, (2020)The Unwritten Rules of PhD Research (Open Up Study Skills), and . Open University Press, 2. edition, (2010)Creating a Datascape: a game to support communities in using open data: Short Paper., , and . C&T, page 135-138. ACM, (2017)Mapping the Landscape of Peer Review in Computing Education Research., , , , , , , , , and 2 other author(s). ITiCSE-WGR, page 173-209. ACM, (2020)Influences of developers' perspectives on their engagement with security in code., , , , , , , , , and . CHASE@ICSE, page 86-95. IEEE, (2022)Revisiting Web Design Guidelines by Exploring Users' Expectations, Preferences and Visual Search Behaviour., , , and . BCS HCI, page 421-438. Springer, (2005)Examining active error in software development., , and . VL/HCC, page 152-156. IEEE Computer Society, (2016)Exploring cognitive bias 'in the wild': technical perspective.. Commun. ACM, 65 (4): 114 (2022)Cognitive Dimensions of Notations: Design Tools for Cognitive Technology., , , , , , , , , and 4 other author(s). Cognitive Technology, volume 2117 of Lecture Notes in Computer Science, page 325-341. Springer, (2001)Design Spaces and How Software Designers Use Them: a sampler., and . CoRR, (2024)