Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing Fit of Nontraditional Assistive Technologies., and . TACCESS, 2 (4): 16:1-16:31 (2010)Hacker Definitions in Information Systems Research., and . J. Comput. Inf. Syst., 62 (2): 397-409 (2022)Individual Characteristics and Their Effect on Predicting Mu Rhythm Modulation., , and . Int. J. Hum. Comput. Interaction, 27 (1): 24-37 (2011)User Profiles for Facilitating Conversations with Locked-In Users., , and . ICIS, Association for Information Systems, (2005)Towards Predicting Control of a Brain-Computer Interface., , and . ICIS, page 53. Association for Information Systems, (2006)Toward a More Secure HRIS: The Role of HCI and Unconscious Behavior., , and . AIS Trans. Hum. Comput. Interact., 9 (1): 4 (2017)Context-aware user profiles to improve media synchronicity for individuals with severe motor disabilities., , , and . Inf. Syst. J., 32 (1): 130-163 (2022)Stuck in the Middle: Reflections from the AMCIS Mid-career Workshop., , and . Commun. Assoc. Inf. Syst., (2018)Into the Mind of the Seller: Using Neurophysiological Tools to Understand Sales Techniques., , and . HICSS, page 425-429. IEEE Computer Society, (2013)An updated and expanded assessment of PLS-SEM in information systems research., , , and . Ind. Manag. Data Syst., 117 (3): 442-458 (2017)