Author of the publication

Studying team shared mental models.

, , , , , , and . ICPW, volume 363 of ACM International Conference Proceeding Series, page 41-48. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Do You See the Warning?: Cybersecurity Warnings via Nonconscious Processing., , and . ACM Southeast Regional Conference, page 260-263. ACM, (2020)Dynamic Warnings: An Eye Gaze-Based Approach., , and . Int. J. Inf. Secur. Priv., 16 (1): 1-28 (2022)Reciprocity attacks., , , and . SOUPS, page 9. ACM, (2011)Subliminal Warnings: Utilizing the High Bandwidth of Nonconscious Visual Perception., , and . PERSUASIVE, volume 13213 of Lecture Notes in Computer Science, page 255-271. Springer, (2022)Contexts and sharing/not sharing private information., , and . ACM Southeast Regional Conference, page 292-297. ACM, (2012)Is older, wiser?: an age-specific study of exposure of private information., , and . ACM Southeast Regional Conference, page 30-35. ACM, (2012)Designing Warnings to Reduce Identity Disclosure., , , , and . Int. J. Hum. Comput. Interact., 34 (11): 1077-1084 (2018)Understanding and minimizing identity exposure in ubiquitous computing environments., , , , and . MobiQuitous, page 1-10. ICST / IEEE, (2009)Studying team shared mental models., , , , , , and . ICPW, volume 363 of ACM International Conference Proceeding Series, page 41-48. ACM, (2008)