default search action
Pamela Briggs
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Kerry McKellar, Elizabeth Sillence, Nick Neave, Pam Briggs:
Digital accumulation behaviours and information management in the workplace: exploring the tensions between digital data hoarding, organisational culture and policy. Behav. Inf. Technol. 43(6): 1206-1218 (2024) - [c69]Behrad Koohy, Jan Buermann, Vahid Yazdanpanah, Pamela Briggs, Paul Pschierer-Barnfather, Enrico H. Gerding, Sebastian Stein:
Adaptive Incentive Engineering in Citizen-Centric AI. AAMAS 2024: 2684-2689 - [c68]Yolanda Gómez, Dawn Branley-Bell, Pam Briggs, José Vila:
Exploring Behavioural Strategies in Cyberinsurance Adoption. ECCE 2024: 17:1-17:6 - [c67]Vasilis Vlachokyriakos, Ian G. Johnson, Robert Anderson, Caroline Claisse, Viana Zhang, Pamela Briggs:
Design Implications for a Social and Collaborative Understanding of online Information Assessment Practices, Challenges and Heuristics. ECSCW 2024 - [c66]Curtis Briddick, Pam Briggs, James Nicholson:
Using Breach and Attack Demonstrations to Explain Spear Phishing Attacks to Young Adults. World Conference on Information Security Education 2024: 65-80 - [i2]Vasilis Vlachokyriakos, Ian G. Johnson, Robert Anderson, Caroline Claisse, Viana Zhang, Pamela Briggs:
Design Implications for a Social and Collaborative Understanding of online Information Assessment Practices, Challenges and Heuristics. CoRR abs/2405.00519 (2024) - 2023
- [j32]Adam N. Joinson, Matt Dixon, Lynne M. Coventry, Pam Briggs:
Development of a new 'human cyber-resilience scale'. J. Cybersecur. 9(1) (2023) - [j31]Dinislam Abdulgalimov, Reuben Kirkham, Stephen Lindsay, James Nicholson, Vasilis Vlachokyriakos, Emily Dao, Daniel Kos, Daniel Jitnah, Pam Briggs, Patrick Olivier:
Designing for the Embedding of Employee Voice. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-31 (2023) - [c65]Benjamin Alan Morrison, James Nicholson, Lynne M. Coventry, Pam Briggs:
Recognising Diversity in Older Adults' Cybersecurity Needs. GoodIT 2023: 437-445 - 2022
- [j30]Joanna Curtis, Gavin Oxburgh, Pam Briggs:
Heroes and Hooligans: The Heterogeneity of Video Game Modders. Games Cult. 17(2): 219-243 (2022) - [j29]Catherine V. Talbot, Amelia Talbot, Danielle J. Roe, Pam Briggs:
The management of LGBTQ+ identities on social media: A student perspective. New Media Soc. 24(8): 1729-1750 (2022) - [j28]Matt Dixon, James Nicholson, Dawn Branley-Bell, Pam Briggs, Lynne M. Coventry:
Holding Your Hand on the Danger Button: Observing User Phish Detection Strategies Across Mobile and Desktop. Proc. ACM Hum. Comput. Interact. 6(MHCI): 1-22 (2022) - [j27]Lisa Thomas, John Vines, Pam Briggs:
Exploring digital support for the student transition to university through questionable concepts. Pers. Ubiquitous Comput. 26(1): 79-92 (2022) - [j26]Lisa Thomas, John Vines, Pam Briggs:
Correction to: Exploring digital support for the student transition to university through questionable concepts. Pers. Ubiquitous Comput. 26(1): 93 (2022) - [c64]Jay Rainey, Siobhan Macfarlane, Aare Puussaar, Vasilis Vlachokyriakos, Roger Burrows, Jan David Smeddinck, Pamela Briggs, Kyle Montague:
Exploring the Role of Paradata in Digitally Supported Qualitative Co-Research. CHI 2022: 584:1-584:16 - [c63]Dawn Branley-Bell, Lynne M. Coventry, Pam Briggs:
Cyber Insurance from the stakeholder's perspective: A qualitative analysis of barriers and facilitators to adoption: A qualitative analysis of barriers and facilitators to adoption. EuroUSEC 2022: 151-159 - 2021
- [j25]Lisa Thomas, Catherine V. Talbot, Pam Briggs:
The Digital Lives of Student Mothers: A Consideration of Technologies That Support or Erode the Student/Parent Boundary. Int. J. Hum. Comput. Stud. 154: 102689 (2021) - 2020
- [c62]Jay Rainey, Juan Carlos Alvarez de la Vega, Dan Richardson, Daniel Lambton-Howard, Sara Armouch, Tom Bartindale, Shaun Hazeldine, Pamela Briggs, Patrick Olivier, Kyle Montague:
TalkFutures: Supporting Qualitative Practices in Distributed Community Engagements. Conference on Designing Interactive Systems 2020: 771-784 - [c61]Dinislam Abdulgalimov, Reuben Kirkham, James Nicholson, Vasilis Vlachokyriakos, Pam Briggs, Patrick Olivier:
Designing for Employee Voice. CHI 2020: 1-13 - [c60]Rosanna Bellini, Nicola Dell, Monica T. Whitty, Debasis Bhattacharya, David Wall, Pamela Briggs:
Crime and/or Punishment: Joining the Dots between Crime, Legality and HCI. CHI Extended Abstracts 2020: 1-8 - [i1]Dinislam Abdulgalimov, Reuben Kirkham, James Nicholson, Vasilis Vlachokyriakos, Pam Briggs, Patrick Olivier:
Designing for Employee Voice. CoRR abs/2003.02976 (2020)
2010 – 2019
- 2019
- [j24]Nick Neave, Pam Briggs, Kerry McKellar, Elizabeth Sillence:
Digital hoarding behaviours: Measurement and evaluation. Comput. Hum. Behav. 96: 72-77 (2019) - [j23]René van Bavel, Nuria Rodríguez-Priego, José Vila, Pam Briggs:
Using protection motivation theory in the design of nudges to improve online security behavior. Int. J. Hum. Comput. Stud. 123: 29-39 (2019) - [c59]Lisa Thomas, Gary W. Pritchard, Pam Briggs:
Digital Design Considerations for Volunteer Recruitment: Making the Implicit Promises of Volunteering More Explicit. C&T 2019: 29-40 - [c58]Rosanna Bellini, Jay Rainey, Andrew Garbett, Pamela Briggs:
Vocalising Violence: Using Violent Mens' Voices for Service Delivery and Feedback. C&T 2019: 210-217 - [c57]Tom Feltwell, Gavin Wood, Scarlett Rowland, Kiel S. Long, Chris Elsden, Phillip Brooker, John Vines, Pamela Briggs, Julie Barnett, Shaun W. Lawson:
Designing Second-Screening Experiences for Social Co-Selection and Critical Co-Viewing of Reality TV. CHI 2019: 70 - [c56]James Nicholson, Lynne M. Coventry, Pamela Briggs:
"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults. CHI 2019: 349 - [c55]Jay Rainey, Kyle Montague, Pamela Briggs, Robert Anderson, Thomas Nappey, Patrick Olivier:
Gabber: Supporting Voice in Participatory Qualitative Practices. CHI 2019: 377 - 2018
- [j22]Lisa Thomas, Pam Briggs, Finola Kerrigan, Andrew Hart:
Exploring digital remediation in support of personal reflection. Int. J. Hum. Comput. Stud. 110: 53-62 (2018) - [j21]Lisa Thomas, Elaine Farrow, Matthew P. Aylett, Pam Briggs:
A life story in three parts: the use of triptychs to make sense of personal digital data. Pers. Ubiquitous Comput. 22(4): 691-705 (2018) - [c54]Enrique Encinas, Mark Blythe, Shaun W. Lawson, John Vines, Jayne Wallace, Pam Briggs:
Making Problems in Design Research: The Case of Teen Shoplifters on Tumblr. CHI 2018: 72 - [c53]James Nicholson, Lynne M. Coventry, Pam Briggs:
Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection. SOUPS @ USENIX Security Symposium 2018: 443-457 - 2017
- [j20]Lisa Thomas, Pam Briggs, Andrew Hart, Finola Kerrigan:
Understanding social media and identity work in young people transitioning to university. Comput. Hum. Behav. 76: 541-553 (2017) - [j19]Debora Jeske, Andrew R. McNeill, Lynne M. Coventry, Pam Briggs:
Security information sharing via Twitter: 'Heartbleed' as a case study. Int. J. Web Based Communities 13(2): 172-192 (2017) - [c52]Aneesha Singh, Nikki Newhouse, Jo Gibbs, Ann E. Blandford, Yunan Chen, Pam Briggs, Helena M. Mentis, Kate M. Sellen, Jakob E. Bardram:
HCI and Health: Learning from Interdisciplinary Interactions. CHI Extended Abstracts 2017: 1322-1325 - [c51]Effie Le Moignan, Shaun W. Lawson, Duncan A. Rowland, Jamie Mahoney, Pam Briggs:
Has Instagram Fundamentally Altered the 'Family Snapshot'? CHI 2017: 4935-4947 - [c50]Andrew R. McNeill, Lynne M. Coventry, Jake Pywell, Pam Briggs:
Privacy Considerations when Designing Social Network Systems to Support Successful Ageing. CHI 2017: 6425-6437 - [c49]Pam Briggs, Debora Jeske, Lynne M. Coventry:
The Design of Messages to Improve Cybersecurity Incident Reporting. HCI (22) 2017: 3-13 - [c48]Steve Warren, Gavin Oxburgh, Pam Briggs, David Wall:
How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime? HCI (22) 2017: 539-556 - [c47]Andrew R. McNeill, Pamela Briggs, Jake Pywell, Lynne M. Coventry:
Functional privacy concerns of older adults about pervasive health-monitoring systems. PETRA 2017: 96-102 - [c46]James Nicholson, Lynne M. Coventry, Pam Briggs:
Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. SOUPS 2017: 285-298 - 2016
- [j18]Elizabeth Sillence, Claire Hardy, Pam Briggs, Peter R. Harris:
How do carers of people with multiple sclerosis engage with websites containing the personal experiences of other carers and patients? Health Informatics J. 22(4): 1045-1054 (2016) - [j17]Lisa Thomas, Pam Briggs:
Assessing the value of brief automated biographies. Pers. Ubiquitous Comput. 20(1): 37-49 (2016) - [j16]Debora Jeske, Pam Briggs, Lynne M. Coventry:
Exploring the relationship between impulsivity and decision-making on mobile devices. Pers. Ubiquitous Comput. 20(4): 545-557 (2016) - [c45]Thanyalak Boonlue, Pam Briggs, Elizabeth Sillence:
Self-Compassion, Psychological Resilience and Social Media Use in Thai Students. BCS HCI 2016 - [c44]Sue Jamison-Powell, Pam Briggs, Shaun W. Lawson, Conor Linehan, Karen Windle, Harriet Gross:
"PS. I Love You": Understanding the Impact of Posthumous Digital Messages. CHI 2016: 2920-2932 - [c43]Matthew P. Aylett, Lisa Thomas, David Philip Green, David A. Shamma, Pam Briggs, Finola Kerrigan:
My Life On Film. CHI Extended Abstracts 2016: 3379-3386 - [c42]Pam Briggs, Elizabeth F. Churchill, Mark Levine, James Nicholson, Gary W. Pritchard, Patrick Olivier:
Everyday Surveillance. CHI Extended Abstracts 2016: 3566-3573 - [c41]Lynne M. Coventry, Pam Briggs:
Mobile Technology for Older Adults: Protector, Motivator or Threat? HCI (24) 2016: 424-434 - 2015
- [j15]Pam Briggs, Lisa Thomas:
An Inclusive, Value Sensitive Design Perspective on Future Identity Technologies. ACM Trans. Comput. Hum. Interact. 22(5): 23:1-23:28 (2015) - [c40]James Turland, Lynne M. Coventry, Debora Jeske, Pam Briggs, Aad P. A. van Moorsel:
Nudging towards security: developing an application for wireless network selection for android phones. BCS HCI 2015: 193-201 - [c39]Gary W. Pritchard, Pam Briggs, John Vines, Patrick Olivier:
How to Drive a London Bus: Measuring Performance in a Mobile and Remote Workplace. CHI 2015: 1885-1894 - [c38]Elizabeth Sillence, Peter R. Harris, Pamela Briggs:
Assessing Patient Experience and Patient Preference when Designing Web Support for Smoking Cessation. Digital Health 2015: 25-26 - [c37]Ahmed Kharrufa, James Nicholson, Paul Dunphy, Steve Hodges, Pam Briggs, Patrick Olivier:
Using IMUs to Identify Supervisors on Touch Devices. INTERACT (2) 2015: 565-583 - [c36]Thomas Dickinson, Miriam Fernández, Lisa A. Thomas, Paul Mulholland, Pam Briggs, Harith Alani:
Identifying Prominent Life Events on Twitter. K-CAP 2015: 4:1-4:8 - [c35]Thomas Dickinson, Miriam Fernández, Lisa A. Thomas, Paul Mulholland, Pam Briggs, Harith Alani:
Automatic Identification of Personal Life Events in Twitter. WebSci 2015: 37:1-37:2 - 2014
- [c34]Gary W. Pritchard, John Vines, Pamela Briggs, Lisa Thomas, Patrick Olivier:
Digitally driven: how location based services impact the work practices of London bus drivers. CHI 2014: 3617-3626 - [c33]Lynne M. Coventry, Pam Briggs, Debora Jeske, Aad P. A. van Moorsel:
SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment. HCI (8) 2014: 229-239 - [c32]Lisa Thomas, Pamela Briggs:
An older adult perspective on digital legacy. NordiCHI 2014: 237-246 - [c31]Debora Jeske, Lynne M. Coventry, Pamela Briggs:
Decision Justifications for Wireless Network Selection. STAST 2014: 1-7 - [c30]Elizabeth Sillence, Claire Hardy, Peter R. Harris, Pamela Briggs:
Modeling patient engagement in peer-to-peer healthcare. WWW (Companion Volume) 2014: 481-486 - [c29]Andrew R. McNeill, Pam Briggs:
Understanding Twitter influence in the health domain: a social-psychological contribution. WWW (Companion Volume) 2014: 673-678 - 2013
- [j14]James Nicholson, Lynne M. Coventry, Pamela Briggs:
Faces and Pictures: Understanding age differences in two types of graphical authentications. Int. J. Hum. Comput. Stud. 71(10): 958-966 (2013) - [c28]James Nicholson, Lynne M. Coventry, Pamela Briggs:
Age-related performance issues for PIN and face-based authentication systems. CHI 2013: 323-332 - [c27]Tim Storer, Stephen Marsh, Sylvie Noël, Babak Esfandiari, Khalil El-Khatib, Pamela Briggs, Karen Renaud, Mehmet Vefa Bicakci:
Encouraging second thoughts: Obstructive user interfaces for raising security awareness. PST 2013: 366-368 - [c26]Elizabeth Sillence, Claire Hardy, Pamela Briggs:
Why don't we trust health websites that help us help each other?: an analysis of online peer-to-peer healthcare. WebSci 2013: 396-404 - [c25]Lisa Thomas, Pamela Briggs, Linda Little:
Location tracking via social networking sites. WebSci 2013: 405-412 - 2012
- [c24]Pamela Briggs, Mark Blythe, John Vines, Stephen Lindsay, Paul Dunphy, James Nicholson, David Philip Green, Jim Kitson, Andrew Monk, Patrick Olivier:
Invisible design: exploring insights and ideas through ambiguous film scenarios. Conference on Designing Interactive Systems 2012: 534-543 - [c23]James Nicholson, Paul Dunphy, Lynne M. Coventry, Pamela Briggs, Patrick Olivier:
A security assessment of tiles: a new portfolio-based graphical authentication system. CHI Extended Abstracts 2012: 1967-1972 - 2011
- [j13]Stephen Marsh, Pamela Briggs, Khalil El-Khatib, Babak Esfandiari, John A. Stewart:
Defining and Investigating Device Comfort. Inf. Media Technol. 6(3): 914-935 (2011) - [j12]Stephen Marsh, Pamela Briggs, Khalil El-Khatib, Babak Esfandiari, John A. Stewart:
Defining and Investigating Device Comfort. J. Inf. Process. 19: 231-252 (2011) - [c22]Linda Little, Pamela Briggs, Lynne M. Coventry:
Who knows about me?: an analysis of age-related disclosure preferences. BCS HCI 2011: 84-87 - [c21]Lisa Thomas, Pamela Briggs, Linda Little:
Does your boss know where you are?: predicting adoption of LBS in the workplace. BCS HCI 2011: 515-519 - [c20]Pam Briggs:
The Evolution of Trust. IFIPTM 2011: 13-16 - [c19]Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang, Pamela Briggs, Lewis Robart, John A. Stewart, Babak Esfandiari, Khalil El-Khatib, Mehmet Vefa Bicakci, Manh Cuong Dao, Michael Cohen, Daniel Da Silva:
Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security. STM 2011: 28-39 - 2010
- [c18]David Kim, Paul Dunphy, Pamela Briggs, Jonathan Hook, John Nicholson, James Nicholson, Patrick Olivier:
Multi-touch authentication on tabletops. CHI 2010: 1093-1102 - [c17]Lisa Thomas, Pamela Briggs, Linda Little:
The impact of using location-based services with a behaviour-disordered child: a case study. NordiCHI 2010: 503-510
2000 – 2009
- 2009
- [j11]Linda Little, Pamela Briggs:
Privacy Factors for Successful Ubiquitous Computing. Int. J. E Bus. Res. 5(2): 1-20 (2009) - [j10]Linda Little, Pamela Briggs:
Private whispers/public eyes: Is receiving highly personal information in a public place stressful? Interact. Comput. 21(4): 316-322 (2009) - [c16]Pamela Briggs, Patrick Olivier, Jim Kitson:
Film as invisible design: the example of the biometric daemon. CHI Extended Abstracts 2009: 3511-3512 - [c15]Pamela Briggs, Linda Little:
Pervasive computing and disability: designing for independence? PETRA 2009 - [c14]Linda Little, Pamela Briggs:
Pervasive healthcare: the elderly perspective. PETRA 2009 - [c13]Linda Little, Elizabeth Sillence, Pamela Briggs:
Ubiquitous systems and the family: thoughts about the networked home. SOUPS 2009 - [p2]Stephen Marsh, Pamela Briggs:
Examining Trust, Forgiveness and Regret as Computational Concepts. Computing with Social Trust 2009: 9-43 - 2008
- [c12]Linda Little, Pamela Briggs:
Ubiquitous healthcare: do we want it? BCS HCI (2) 2008: 53-56 - [c11]Ann Light, Pam Briggs, Karen Martin:
Seeding without leading: making space for participant contribution in design elicitation techniques. BCS HCI (2) 2008: 159-161 - [c10]Elizabeth Sillence, Linda Little, Pamela Briggs:
e-health. BCS HCI (2) 2008: 179-180 - [c9]Pamela Briggs, Patrick L. Olivier:
Biometric daemons: authentication via electronic pets. CHI Extended Abstracts 2008: 2423-2432 - [c8]Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs:
Secrets and lies in computer-mediated interaction: theory, methods and design. CHI Extended Abstracts 2008: 3993-3996 - [c7]Pamela Briggs, Patrick L. Olivier:
Biometric Daemons: Authentication via Electronic Pets. UPSEC 2008 - 2007
- [j9]Elizabeth Sillence, Pamela Briggs:
Please advise: using the Internet for health and financial advice. Comput. Hum. Behav. 23(1): 727-748 (2007) - [j8]Elizabeth Sillence, Pamela Briggs, Peter R. Harris, Lesley Fishwick:
Health Websites that people can trust - the case of hypertension. Interact. Comput. 19(1): 32-42 (2007) - [j7]Elizabeth Sillence, Pamela Briggs, Peter R. Harris, Lesley Fishwick:
Going online for health advice: Changes in usage and trust practices over the last five years. Interact. Comput. 19(3): 397-406 (2007) - 2006
- [j6]Elizabeth Sillence, Pamela Briggs, Peter R. Harris, Lesley Fishwick:
A framework for understanding trust factors in web-based health advice. Int. J. Hum. Comput. Stud. 64(8): 697-713 (2006) - [c6]Elizabeth Sillence, Pamela Briggs, Peter R. Harris, Lesley Fishwick:
Changes in online health usage over the last 5 years. CHI Extended Abstracts 2006: 1331-1336 - 2005
- [j5]Linda Little, Pamela Briggs, Lynne M. Coventry:
Public space systems: Designing for privacy? Int. J. Hum. Comput. Stud. 63(1-2): 254-268 (2005) - [c5]Elizabeth Sillence, Pamela Briggs, Lesley Fishwick, Peter R. Harris:
Guidelines for developing trust in health websites. WWW (Special interest tracks and posters) 2005: 1026-1027 - 2004
- [c4]Elizabeth Sillence, Pamela Briggs, Lesley Fishwick, Peter R. Harris:
Trust and mistrust of online health sites. CHI 2004: 663-670 - [c3]Stephen Marsh, Pamela Briggs, Waleed Wagealla:
Considering trust in ambient societies. CHI Extended Abstracts 2004: 1707-1708 - [c2]John P. Eakins, Pamela Briggs, Bryan Christopher Burford:
Image Retrieval Interfaces: A User Perspective. CIVR 2004: 628-637 - [p1]Pamela Briggs, Brad Simpson, Antonella De Angeli:
Personalisation and Trust: A Reciprocal Relationship? Designing Personalized User Experiences in eCommerce 2004: 39-55 - 2000
- [j4]Manling Ren, John P. Eakins, Pamela Briggs:
Human perception of trademark images: Implications for retrieval system design. J. Electronic Imaging 9(4): 564-575 (2000)
1990 – 1999
- 1998
- [j3]Pamela Briggs, Bryan Christopher Burford, C. Dracup:
Modelling self-confidence in users of a computer-based system showing unrepresentative design. Int. J. Hum. Comput. Stud. 49(5): 717-742 (1998) - 1994
- [j2]Alan Tero, Pamela Briggs:
Consistency versus compatibility: a question of levels? Int. J. Hum. Comput. Stud. 40(5): 879-894 (1994) - 1990
- [j1]Pamela Briggs:
Do They Know What They're Doing? An Evaluation of Word-Processor Users' Implicit and Explicit Task-Relevant Knowledge, and Its Role in Self-Directed Learning. Int. J. Man Mach. Stud. 32(4): 385-398 (1990)
1980 – 1989
- 1987
- [c1]Pamela Briggs:
The role of the user model in learning as an internally and externally directed activity. Informatics and Psychology Workshop 1987: 195-208
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint