Author of the publication

Eliciting and modelling expertise for serious games in project management.

, , , and . Entertain. Comput., 2 (2): 75-80 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rich Media, Poor Judgement? A Study of Media Effects on Users' Trust in Expertise., , and . BCS HCI, page 267-284. Springer, (2005)Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App., , , , , and . ICICS, volume 12282 of Lecture Notes in Computer Science, page 223-242. Springer, (2020)Peeking Into the Black Box: Towards Understanding User Understanding of E2EE., , , and . EuroUSEC, page 129-140. ACM, (2021)How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study., , , , , and . SP, page 893-910. IEEE, (2022)Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)., , , , , , , and . WWW (Companion Volume), page 1311-1314. ACM, (2017)Light-Touch Interventions to Improve Software Development Security., , , , and . SecDev, page 85-93. IEEE Computer Society, (2018)Applying Cognitive Control Modes to Identify Security Fatigue Hotspots., , , and . WSF@SOUPS, USENIX Association, (2016)"I don't like putting my face on the Internet!": An acceptance study of face biometrics as a CAPTCHA replacement., , and . ISBA, page 1-7. IEEE, (2016)The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength., , and . USENIX Security Symposium, page 239-253. USENIX Association, (2018)A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries., , , , , , , and . CHI, page 582:1-582:23. ACM, (2023)