Author of the publication

Content information desired by Chinese users for effective use of information appliances.

, , and . Comput. Hum. Behav., 26 (6): 1685-1693 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Failure Tolerant Teleoperation of a Kinematically Redundant Manipulator: An Experimental Study., , , and . ICRA, page 874-880. IEEE Robotics and Automation Society, (1999)Usability of User Agents for Privacy-Preference Specification., , and . HCI (9), volume 4558 of Lecture Notes in Computer Science, page 766-776. Springer, (2007)How Users Read and Comprehend Privacy Policies., , , , , , , and . HCI (9), volume 4558 of Lecture Notes in Computer Science, page 802-811. Springer, (2007)Introduction to Special Issue: Foundations of Cognitive Science for the Design of Human-Computer Interactive Systems., and . Int. J. Hum. Comput. Interaction, 33 (1): i (2017)Influence of the Privacy Bird® user agent on user trust of different web sites., , , , and . Comput. Ind., 61 (4): 311-317 (2010)Attentional gradient for crossmodal proximal-distal tactile cueing of visual spatial attention., , , and . ACM Trans. Appl. Percept., 8 (4): 23:1-23:12 (2011)Effective Risk Communication for Android Apps., , , and . IEEE Trans. Dependable Secur. Comput., 11 (3): 252-265 (2014)Content preparation and management for e-commerce Web sites., , , , and . Commun. ACM, 46 (12): 289-299 (2003)Towards quantification of firewall policy complexity., , , , and . HotSoS, page 18:1-18:2. ACM, (2015)CodeShield: towards personalized application whitelisting., , , and . ACSAC, page 279-288. ACM, (2012)