Author of the publication

Introduction and Overview.

, , and . Designing Personalized User Experiences in eCommerce, volume 5 of Human-Computer Interaction Series, Kluwer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery., and . Emergent Information Technologies and Enabling Policies for Counter-Terrorism, Wiley-IEEE Press, (2006)User centered design: quality or quackery?. Interactions, 3 (4): 18-20 (1996)Designing Natural Language and Structured Entry Methods for Privacy Policy Authoring., , , and . INTERACT, volume 3585 of Lecture Notes in Computer Science, page 671-684. Springer, (2005)Personalizing the user experience on ibm.com., , , , and . IBM Syst. J., 42 (4): 686-701 (2003)Privacy-aware role-based access control., , , , , , and . ACM Trans. Inf. Syst. Secur., 13 (3): 24:1-24:31 (2010)Supporting effective and efficient design meetings., and . INTERACT, page 365-370. North-Holland, (1990)Usable Policy Template Authoring for Iterative Policy Refinement., , , and . POLICY, page 18-21. IEEE Computer Society, (2010)A Negotiation Framework for Negotiation of Coalition Policies., , , , and . POLICY, page 133-136. IEEE Computer Society, (2010)Facilitating effective HCI design meetings., and . CHI, page 198-204. ACM, (1994)Practical Education for Improving Software Usability., and . CHI, page 162-169. ACM/Addison-Wesley, (1995)