Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can reduced processing decision support interfaces improve the decision-making of less-experienced incident commanders?, , , and . Decis. Support Syst., 52 (2): 497-504 (2012)The Role of Cue Utilization and Cognitive Load in the Recognition of Phishing Emails., , , , , and . Frontiers Big Data, (2020)Response to a phishing attack: persuasion and protection motivation in an organizational context., , , and . Inf. Comput. Secur., 30 (1): 63-78 (2022)The Potential Role of Context-Related Exposure in Explaining Differences in Water Safety Cue Utilization., , and . Hum. Factors, (2019)Towards a cognition-based assessment protocol for user-centered design., , , and . OZCHI, page 135-138. ACM, (2013)Cue Utilization, Phishing Feature and Phishing Email Detection., , and . Financial Cryptography Workshops, volume 12063 of Lecture Notes in Computer Science, page 56-70. Springer, (2020)Identifying Diagnostic Experts - Measuring the Antecedents to Pattern Recognition., , , and . ICPRAM (2), page 269-274. SciTePress, (2012)Differentiating Experience From Cue Utilization in Radiological Assessments., , , , , and . Hum. Factors, (2021)Differentiating Cognitive Complexity and Cognitive Load in High and Low Demand Flight Simulation Tasks., , , and . OZCHI (LNCS Selection), volume 8433 of Lecture Notes in Computer Science, page 133-150. Springer, (2013)The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails., , , , , and . Financial Cryptography Workshops, volume 12063 of Lecture Notes in Computer Science, page 47-55. Springer, (2020)