Author of the publication

Do You Speak Meme? A Dynamic Digital Language for the InformationSociety.

, , and . iConference (1), volume 13971 of Lecture Notes in Computer Science, page 523-534. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Consciousness of Cyber Defense: Boundary Objects for Expansive Learning Through Creation of Contradictions., , and . HCI (24), volume 11589 of Lecture Notes in Computer Science, page 338-353. Springer, (2019)Leader's dilemma game: An experimental design for cyber insider threat research., and . Inf. Syst. Frontiers, 19 (2): 377-396 (2017)Insider Threat: Language-action Cues in Group Dynamics., , , , , and . CPR, page 101-104. ACM, (2015)Panel: Cybersecurity Workforce Development., , , , , , , and . CPR, page 15-17. ACM, (2015)A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 3 (1/2): 82-98 (2012)Whodunit? Collective Trust in Virtual Interactions., , and . SBP, volume 7227 of Lecture Notes in Computer Science, page 348-356. Springer, (2012)The Privacy Paradox in HCI: Calculus Behavior in Disclosing PII Online., and . HCI (24), volume 11589 of Lecture Notes in Computer Science, page 163-177. Springer, (2019)Seeking beyond with IntegraL: A user study of sense-making enabled by anchor-based virtual integration of library systems., , , and . J. Assoc. Inf. Sci. Technol., 64 (9): 1927-1945 (2013)Real or Spiel? A Decision Tree Approach for Automated Detection of Deceptive Language-Action Cues., , , , , , and . HICSS, page 3706-3715. IEEE Computer Society, (2016)IntegraL Connects Data, User and Scientists., , and . IASSIST, (2010)