From post

Design guidelines for effective recommender system interfaces based on a usability criteria conceptual model: results from a college student population

, , и . Behav. Inf. Technol., (января 2010)
DOI: 10.1080/01449290903004012

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computer usage by young individuals with down syndrome: an exploratory study., , , и . ASSETS, стр. 35-42. ACM, (2008)Design guidelines for effective recommender system interfaces based on a usability criteria conceptual model: results from a college student population, , и . Behav. Inf. Technol., (января 2010)Perceived security determinants in e-commerce among Turkish university students., , и . Behav. Inf. Technol., 24 (4): 259-274 (2005)A Comparative Study Between Tablet and Laptop PCs: User Satisfaction and Preferences., , , и . Int. J. Hum. Comput. Interaction, 24 (3): 329-352 (2008)Book Review: HCI Models, theories, and frameworks: Towards a multidisciplinary science, by John M. Carroll.. Int. J. Hum. Comput. Interaction, 17 (2): 289-290 (2004)Perception and acceptance of fingerprint biometric technology., , и . SOUPS, том 229 из ACM International Conference Proceeding Series, стр. 153-154. ACM, (2007)A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords., , и . SOUPS, том 149 из ACM International Conference Proceeding Series, стр. 56-66. ACM, (2006)Exploring Training Issues in Healthcare: Towards Identifying Barriers to Increase Electronic Medical Records Adoption by Healthcare Professionals., и . USAB, том 7058 из Lecture Notes in Computer Science, стр. 657-671. Springer, (2011)Better in 3D? An Empirical Investigation of User Satisfaction and Preferences Concerning Two-Dimensional and Three-Dimensional Product Representations in Business-to-Consumer E-Commerce., и . Int. J. Hum. Comput. Interaction, 25 (4): 243-281 (2009)A user-centered approach to visualizing network traffic for intrusion detection., , , , и . CHI Extended Abstracts, стр. 1403-1406. ACM, (2005)