Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things., , , , , and . TRUST, volume 7904 of Lecture Notes in Computer Science, page 223-231. Springer, (2013)Money on the move workload, usability and technology acceptance of second-screen atm-interactions., , , , , and . Mobile HCI, page 281-284. ACM, (2013)Persuasive Information Security: Techniques to Help Employees Protect Organizational Information Security., , , , and . PERSUASIVE, volume 9638 of Lecture Notes in Computer Science, page 339-351. Springer, (2016)Materializing trust as an understandable digital concept.. CHI Extended Abstracts, page 1933-1936. ACM, (2013)Being there for real: presence in real and virtual environments and its relation to usability., , , , and . NordiCHI, page 117-126. ACM, (2014)HCI for PrimeLife Prototypes., , , , and . Privacy and Identity Management for Life, Springer, (2011)Privacy, Trust and Interaction in the Internet of Things., , and . AmI Workshops, volume 277 of Communications in Computer and Information Science, page 264-266. Springer, (2011)uTRUSTit - Usable Trust in the Internet of Things., , , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 220-221. Springer, (2012)Do you enjoy getting gifts?: keeping personas alive through marketing materials., , and . CHI Extended Abstracts, page 2355-2358. ACM, (2013)TACTUX: a tactile user experience assessment board., , , , and . NordiCHI, page 983-986. ACM, (2014)