Author of the publication

Augmented Cognition Methods for Evaluating Serious Game Based Insider Cyber Threat Detection Training.

, , , , , and . HCI (20), volume 6780 of Lecture Notes in Computer Science, page 395-403. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Determining the Effectiveness of the Usability Problem Inspector: A Theory-Based Model and Tool for Finding Usability Problems., , and . Hum. Factors, 45 (3): 455-482 (2003)Determining the Effectiveness of the Usability Problem Inspector: A Theory-Based Model and Tool for Finding Usability Problems.. Virginia Tech, Blacksburg, VA, USA, (2001)base-search.net (ftvirginiatec:oai:vtechworks.lib.vt.edu:10919/26788).Training organizational supervisors to detect and prevent cyber insider threats: two approaches., , , , , , and . EAI Endorsed Trans. Security Safety, 1 (2): e4 (2013)The user action framework: a reliable foundation for usability engineering support tools., , , and . Int. J. Hum. Comput. Stud., 54 (1): 107-136 (2001)Augmented Cognition Methods for Evaluating Serious Game Based Insider Cyber Threat Detection Training., , , , , and . HCI (20), volume 6780 of Lecture Notes in Computer Science, page 395-403. Springer, (2011)Criteria For Evaluating Usability Evaluation Methods., , and . Int. J. Hum. Comput. Interaction, 15 (1): 145-181 (2003)The User Action Framework: A Theory-Based Foundation for Inspection and Classification of Usability Problems., , , and . HCI (1), page 1058-1062. Lawrence Erlbaum, (1999)Criteria For Evaluating Usability Evaluation Methods., , and . Int. J. Hum. Comput. Interaction, 13 (4): 373-410 (2001)