Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An informal study of visual depictions of workflows., and . IRMA Conference, page 1029-1030. IDEA Group Publishing, (2000)Towards a metacognitive approach to credibility., , and . WICOW, page 75-80. ACM, (2008)Forget the Password: Password Memory and Security Applications of Augmented Cognition., , , , and . HCI (16), volume 10916 of Lecture Notes in Computer Science, page 133-142. Springer, (2018)Implications of User Anxiety in the Evaluation of Deception in Web Sites., , and . HCI (16), volume 5638 of Lecture Notes in Computer Science, page 114-119. Springer, (2009)Comprehension of Pascal Statements by Novice and Expert programmers., and . ACM SIGCHI Bull., 21 (3): 20-23 (1990)Does interactivity influence learning in Web-based environments?, , and . WebNet, page 249-250. AACE, (2001)A TCP/IP Network Facsimile System Built from Publicly Available Software., , and . ACM Conference on Computer Science, page 525-532. ACM, (1992)Privacy and Security Perceptions in Augmented Cognition Applications., , , , and . HCI (9), volume 14019 of Lecture Notes in Computer Science, page 429-440. Springer, (2023)The Fiction in Computer Science: A Qualitative Data Analysis of the ACM Digital Library for Traces of Star Trek., and . AHFE (23), volume 607 of Advances in Intelligent Systems and Computing, page 508-520. Springer, (2017)Augmented Cognition for Continuous Authentication., , , and . HCI (14), volume 10284 of Lecture Notes in Computer Science, page 342-356. Springer, (2017)