Author of the publication

Social Network Analysis and Communication in Emergency Response Simulations.

, and . J. Organ. Comput. Electron. Commer., 24 (2-3): 236-256 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning with Trees: - A Non-linear E-Textbook Format for Deep Learning., , , and . HCI (25), volume 11590 of Lecture Notes in Computer Science, page 402-422. Springer, (2019)Helping Users Secure Their Data by Supporting Mental Models of VeraCrypt., , and . HCI (33), volume 1032 of Communications in Computer and Information Science, page 211-218. Springer, (2019)Benefits and Limitations of the Social Network Analysis When Explaining Instances of Ineffective Communication in Two Chemical, Biological, Radiological, Nuclear, and Explosives Simulations., and . CGC, page 327-334. IEEE Computer Society, (2013)Player Matching for Social Exergame Retention: A Group Personality Composition Approach., , , , , and . CHI PLAY (Companion), page 198-203. ACM, (2020)Hide-and-Seek with Website Identity Information., and . PST, page 1-6. IEEE Computer Society, (2018)Perceived and objective usability and visual appeal in a website domain with a less developed mental model., , and . OZCHI, page 316-323. ACM, (2014)How does information diffuse in large recommendation social networks?, , and . IEEE Netw., 30 (4): 28-33 (2016)Control and Understanding in Malware and Legitimate Software., , , and . eCrime, page 1-11. IEEE, (2019)Identifying user requirements for a CBRNE management system: A comparison of data analysis methods., , , , , and . ISCRAM, LNEC, Lisbon, Portugal, (2011)Website Identity Notification: Testing the Simplest Thing That Could Possibly Work., , , and . PST, page 1-7. IEEE, (2019)