Author of the publication

Persuasive Information Security: Techniques to Help Employees Protect Organizational Information Security.

, , , , and . PERSUASIVE, volume 9638 of Lecture Notes in Computer Science, page 339-351. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing the Usefulness and Acceptance of HERMES MyFuture System in Two European Countries., , , , , and . ISAmI, volume 72 of Advances in Intelligent and Soft Computing, page 205-208. Springer, (2010)Der Reisesupermarkt: Design und Entwicklung einer Interaktionsphilosophie für die Beratung in Reisebüros., , and . Software-Ergonomie, volume 45 of Berichte des German Chapter of the ACM, page 281-292. Teubner, (1995)Using Player Type Models for Personalized Game Design - An Empirical Investigation., , , , , , , and . IxD&A, (2016)Advanced interaction in university based education., and . INTERACT, page 423-426. Chapman & Hall, (1995)More experiences: other sides of the profession story.. Interactions, 12 (3): 48-49 (2005)Context in mobile HCI.. Mobile HCI, page 355-356. ACM, (2005)Trust in Automated Vehicles., , , , and . i-com, 17 (1): 79-90 (2018)Using Heuristics to Evaluate the Overall User Experience of Video Games and Advanced Interaction Games, , , , , and . Evaluating User Experience in Games, chapter 13, Springer, in press.(March 2010)Revisiting Corporate Social Media: Challenges and Implications from a Long-Term Study., , and . GROUP, page 157-166. ACM, (2014)From Awareness to Empowerment: Using Design Fiction to Explore Paths towards a Sustainable Energy Future., , and . CSCW, page 1649-1658. ACM, (2015)