


default search action
International Journal of Human-Computer Studies, Volume 123
Volume 123, March 2019
- Ingrid Nunes
, Phillip Taylor, Lina Barakat, Nathan Griffiths, Simon Miles:
Explaining reputation assessments. 1-17 - Pierre Tchounikine:
Framing design for appropriation with Zones of Proximal Evolution: Email for PIM. 18-28 - René van Bavel, Nuria Rodríguez-Priego
, José Vila
, Pam Briggs
:
Using protection motivation theory in the design of nudges to improve online security behavior. 29-39 - Jurjen Jansen, Paul van Schaik
:
The design and evaluation of a theory-based intervention to promote security behaviour against phishing. 40-55 - Marco Manca
, Fabio Paternò
, Carmen Santoro, Luca Corcella:
Supporting end-user debugging of trigger-action rules for IoT applications. 56-69 - Muhammad Azhar Hussain
, Kamran Ahsan, Sarwat Iqbal
, Adnan Nadeem
:
Supporting deafblind in congregational prayer using speech recognition and vibro-tactile stimuli. 70-96

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.