Author of the publication

Designing a system for land change science meta-study.

, , , and . CHI Extended Abstracts, page 1473-1478. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Work of Intrusion Detection: Rethinking the Role of Security Analysts., , and . AMCIS, page 179. Association for Information Systems, (2004)Motivating Cybersecurity Advocates: Implications for Recruitment and Retention., and . SIGMIS-CPR, page 109-117. ACM, (2019)Preserving the Big Picture: Visual Network Traffic Analysis with TN., , , and . VizSEC, page 6. IEEE Computer Society, (2005)Understanding situated action in ludic ecologies., , and . C&T, page 100-109. ACM, (2013)A user-centered approach to visualizing network traffic for intrusion detection., , , , and . CHI Extended Abstracts, page 1403-1406. ACM, (2005)Why use memo for all?: restructuring mobile applications to support informal note taking., , and . CHI Extended Abstracts, page 1320-1323. ACM, (2005)Opening up the black box of scholarly synthesis: Intermediate products, processes, and tools., , , and . ASIST, volume 57 of Proc. Assoc. Inf. Sci. Technol., Wiley, (2020)Playing with leadership and expertise: military tropes and teamwork in an arg., , and . CHI, page 715-724. ACM, (2013)Collaborative interpretation in land change science meta-studies., and . CSCW Companion, page 269-272. ACM, (2014)"It's Scary...It's Confusing...It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security., and . SOUPS @ USENIX Security Symposium, page 411-425. USENIX Association, (2018)