Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Job Analysis and Cognitive Task Analysis in National Security Environments., , and . HCI (13), volume 9743 of Lecture Notes in Computer Science, page 341-347. Springer, (2016)Methods for Determining the Role of Fatigue and Cognitive Load on Behavior Detection Officers (BDOs) Performance in the Field., and . HCI (15), volume 9183 of Lecture Notes in Computer Science, page 36-43. Springer, (2015)A Quantitative Methodology for Identifying Attributes Which Contribute to Performance for Officers at the Transportation Security Administration., , and . HCI (15), volume 9183 of Lecture Notes in Computer Science, page 373-380. Springer, (2015)Modeling human-technology interaction as a sociotechnical system of systems., , , , , , and . SoSE, page 1-6. IEEE, (2017)Relationship Between Facebook Use and Problematic Internet Use Among College Students., , and . Cyberpsy., Behavior, and Soc. Networking, 15 (6): 324-327 (2012)Exploring Human-Technology Interaction in Layered Security Military Applications., , , , , and . HCI (22), volume 9752 of Lecture Notes in Computer Science, page 241-250. Springer, (2016)Group Formation Theory at Multiple Scales., , , , , , and . SBP-BRiMS, volume 12268 of Lecture Notes in Computer Science, page 171-181. Springer, (2020)Improving Analysis and Decision-Making Through Intelligent Web Crawling., , , and . HCI (14), volume 9744 of Lecture Notes in Computer Science, page 414-420. Springer, (2016)