Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Schrödinger's security: opening the box on app developers' security rationale., , , , , , , and . ICSE, page 149-160. ACM, (2020)The Unwritten Rules of PhD Research (Open Up Study Skills), and . Open University Press, 2. edition, (2010)Exploring cognitive bias 'in the wild': technical perspective.. Commun. ACM, 65 (4): 114 (2022)Cognitive Dimensions of Notations: Design Tools for Cognitive Technology., , , , , , , , , and 4 other author(s). Cognitive Technology, volume 2117 of Lecture Notes in Computer Science, page 325-341. Springer, (2001)Influences of developers' perspectives on their engagement with security in code., , , , , , , , , and . CHASE@ICSE, page 86-95. IEEE, (2022)Mapping the Landscape of Peer Review in Computing Education Research., , , , , , , , , and 2 other author(s). ITiCSE-WGR, page 173-209. ACM, (2020)Creating a Datascape: a game to support communities in using open data: Short Paper., , and . C&T, page 135-138. ACM, (2017)Revisiting Web Design Guidelines by Exploring Users' Expectations, Preferences and Visual Search Behaviour., , , and . BCS HCI, page 421-438. Springer, (2005)Examining active error in software development., , and . VL/HCC, page 152-156. IEEE Computer Society, (2016)IT in Society: a Multi-Disciplinary Course, and . IEEE Frontiers in Education conference, (1999)