Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 reuter2015mensch
%A Reuter, Christian
%A Mentler, Tilo
%A Geisler, Stefan
%A Herczeg, Michael
%A Ludwig, Thomas
%A Pipek, Volkmar
%A Nestler, Simon
%A Sautter, Johannes
%D 2015
%I De Gruyter Oldenbourg
%J Mensch und Computer 2015--Workshopband
%K CHI Computing HCI Positive imported
%T Mensch-Computer-Interaktion und Social Computing in sicherheitskritischen Systemen
@article{reuter2015mensch,
added-at = {2019-05-03T15:36:51.000+0200},
author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
biburl = {https://www.bibsonomy.org/bibtex/28769c30ede75e6b1a9af5cc6274ffbac/ux-space},
interhash = {22557bc67ad997b32add0d81b2e77e22},
intrahash = {8769c30ede75e6b1a9af5cc6274ffbac},
journal = {Mensch und Computer 2015--Workshopband},
keywords = {CHI Computing HCI Positive imported},
publisher = {De Gruyter Oldenbourg},
pubstate = {published},
timestamp = {2019-05-03T15:37:17.000+0200},
title = {Mensch-Computer-Interaktion und Social Computing in sicherheitskritischen Systemen},
tppubtype = {article},
year = 2015
}