Author of the publication

The effects of visual proxemic information in video mediated communication.

, and . ACM SIGCHI Bull., 30 (3): 30-39 (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognitive style and intelligent help.. INTERACT, page 1007-1008. North-Holland, (1990)Privacy Considerations when Designing Social Network Systems to Support Successful Ageing., , , and . CHI, page 6425-6437. ACM, (2017)Some Effects of Cognitive Style on Learning UNIX.. Int. J. Man Mach. Stud., 31 (3): 349-365 (1989)Security information sharing via Twitter: 'Heartbleed' as a case study., , , and . Int. J. Web Based Communities, 13 (2): 172-192 (2017)Using animated scenarios to explore severity of cyberbullying and reporting readiness., , and . OZCHI, page 448-451. ACM, (2014)"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults., , and . CHI, page 349. ACM, (2019)An Appraisal-Based Approach to the Stigma of Walker-Use., and . HCI (25), volume 9193 of Lecture Notes in Computer Science, page 250-261. Springer, (2015)Holding Your Hand on the Danger Button: Observing User Phish Detection Strategies Across Mobile and Desktop., , , , and . Proc. ACM Hum. Comput. Interact., 6 (MHCI): 1-22 (2022)Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems., , , and . Int. J. Hum. Comput. Stud., 63 (1-2): 128-152 (2005)Cyber Security Games: A New Line of Risk., and . ICEC, volume 7522 of Lecture Notes in Computer Science, page 600-603. Springer, (2012)