From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

When Training Gets Trumped: How dual-Task interference inhibits Security Training., , , и . ECIS, стр. Research Paper 163. (2016)What Do We Really Know about How Habituation to Warnings Occurs Over Time?: A Longitudinal fMRI Study of Habituation and Polymorphic Warnings., , , , и . CHI, стр. 2215-2227. ACM, (2017)Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals., , , и . Inf. Technol. Dev., 20 (2): 196-213 (2014)From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It., , , , и . J. Manag. Inf. Syst., 33 (3): 713-743 (2016)Framework of Affordances for Virtual Reality and Augmented Reality., , , , и . J. Manag. Inf. Syst., 36 (3): 683-729 (2019)Introduction to the Minitrack on Human-Computer Interaction in the Digital Economy., , и . HICSS, стр. 1-2. ScholarSpace, (2021)Knowledge Sourcing and Knowledge Consumption in Computer-Mediated Complex Decision Making., , , и . HICSS, стр. 1-8. IEEE Computer Society, (2011)Introduction to the Minitrack on Human-Computer Interaction in the Digital Economy., , и . HICSS, стр. 1. ScholarSpace, (2020)Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers., , , , , и . J. Assoc. Inf. Sci. Technol., 63 (4): 755-776 (2012)Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews., , , и . ISI, стр. 97-102. IEEE, (2015)