default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 72 matches
- 2014
- Ikenna Adiele, Wole Olatokun:
Prevalence and determinants of Internet addiction among adolescents. Comput. Hum. Behav. 31: 100-110 (2014) - Ángel Francisco Agudo-Peregrina, Santiago Iglesías-Pradas, Miguel Ángel Conde González, Ángel Hernández-García:
Can we predict success from log data in VLEs? Classification of interactions for learning analytics and their relation with performance in VLE-supported F2F and online learning. Comput. Hum. Behav. 31: 542-550 (2014) - Ghada Al-Hudhud, Mai Abdulaziz Alzamel, Eman Alattas, Areej Al-Wabil:
Using brain signals patterns for biometric identity verification systems. Comput. Hum. Behav. 31: 224-229 (2014) - Young Min Baek, Eun-mee Kim, Young Bae:
My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns. Comput. Hum. Behav. 31: 48-56 (2014) - Sara Bastiaensens, Heidi Vandebosch, Karolien Poels, Katrien Van Cleemput, Ann DeSmet, Ilse De Bourdeaudhuij:
Cyberbullying on social network sites. An experimental study into bystanders' behavioural intentions to help the victim or reinforce the bully. Comput. Hum. Behav. 31: 259-271 (2014) - Nick Breems, Andrew Basden:
Understanding of computers and procrastination: A philosophical approach. Comput. Hum. Behav. 31: 211-223 (2014) - Luis Miguel Serrano Cámara, Maximiliano Paredes-Velasco, Carlos-María Alcover, J. Ángel Velázquez-Iturbide:
An evaluation of students' motivation in computer-supported collaborative learning of programming concepts. Comput. Hum. Behav. 31: 499-508 (2014) - Xavi Canaleta, David Vernet, Lluís Vicent, José Antonio Montero:
Master in Teacher Training: A real implementation of Active Learning. Comput. Hum. Behav. 31: 651-658 (2014) - Yi-Cheng Chen:
An empirical examination of factors affecting college students' proactive stickiness with a web-based English learning environment. Comput. Hum. Behav. 31: 159-171 (2014) - Sung-Pei Chien, Hsin-Kai Wu, Ying-Shao Hsu:
An investigation of teachers' beliefs and their use of technology-based assessments. Comput. Hum. Behav. 31: 198-210 (2014) - William J. Chopik, Robin S. Edelstein:
Death of a salesman: Webpage-based manipulations of mortality salience. Comput. Hum. Behav. 31: 94-99 (2014) - Michelle Drouin, Elizabeth Tobin:
Unwanted but consensual sexting among young adults: Relations with attachment and sexual motivations. Comput. Hum. Behav. 31: 412-418 (2014) - Anna Felnhofer, Oswald D. Kothgassner, Nathalie Hauk, Leon Beutl, Helmut Hlavacs, Ilse Kryspin-Exner:
Physical and social presence in collaborative virtual environments: Exploring age and gender differences with respect to empathy. Comput. Hum. Behav. 31: 272-279 (2014) - William Flores, Jeng-Chung Victor Chen, William H. Ross:
The effect of variations in banner ad, type of product, website context, and language of advertising on Internet users' attitudes. Comput. Hum. Behav. 31: 37-47 (2014) - David Fonseca, Nuria Martí, Ernesto Redondo, Isidro Navarro, Albert Sánchez Riera:
Relationship between student profile, tool use, participation, and academic performance with the use of Augmented Reality technology for visualized architecture models. Comput. Hum. Behav. 31: 434-445 (2014) - Deborah Kirby Forgays, Ira Hyman, Jessie Schreiber:
Texting everywhere for everything: Gender and age differences in cell phone etiquette and use. Comput. Hum. Behav. 31: 314-321 (2014) - Matteo Gaeta, Vincenzo Loia, Giuseppina Rita Mangione, Francesco Orciuoli, Pierluigi Ritrovato, Saverio Salerno:
A methodology and an authoring tool for creating Complex Learning Objects to support interactive storytelling. Comput. Hum. Behav. 31: 620-637 (2014) - Francisco J. García-Peñalvo, Lluís Vicent Safont:
Human behaviors in computer-based education systems. Comput. Hum. Behav. 31: 432-433 (2014) - Carina S. González-González, Pedro Antonio Toledo Delgado, César Alberto Collazos Ordóñez, José Luis González Sánchez:
Design and analysis of collaborative interactions in social educational videogames. Comput. Hum. Behav. 31: 602-611 (2014) - Miguel Ángel Conde González, Francisco J. García-Peñalvo, María José Rodríguez-Conde, Marc Alier Forment, Alicia García-Holgado:
Perceived openness of Learning Management Systems by students and teachers in education and technology courses. Comput. Hum. Behav. 31: 517-526 (2014) - Eva González, Begoña Orgaz:
Problematic online experiences among Spanish college students: Associations with Internet use characteristics and clinical symptoms. Comput. Hum. Behav. 31: 151-158 (2014) - Matthieu J. Guitton:
Artificial vs. enhanced intelligence: Computer or human behavior? Comput. Hum. Behav. 31: 332-333 (2014) - Matthieu J. Guitton:
The importance of studying the dark side of social networks. Comput. Hum. Behav. 31: 355 (2014) - Juan Pablo Hernández-Ramos, Fernando Martínez-Abad, Francisco J. García-Peñalvo, María Esperanza Herrera García, María José Rodríguez-Conde:
Teachers' attitude regarding the use of ICT. A factor reliability and validity study. Comput. Hum. Behav. 31: 509-516 (2014) - Matt C. Howard:
An epidemiological assessment of online groups and a test of a typology: What are the (dis)similarities of the online group types? Comput. Hum. Behav. 31: 123-133 (2014) - Garett Howardson, Tara S. Behrend:
Using the Internet to recruit employees: Comparing the effects of usability expectations and objective technological characteristics on Internet recruitment outcomes. Comput. Hum. Behav. 31: 334-342 (2014) - Hyunseok Jang, Juyoung Song, Ramhee Kim:
Does the offline bully-victimization influence cyberbullying behavior among youths? Application of General Strain Theory. Comput. Hum. Behav. 31: 85-93 (2014) - Daniel Kardefelt-Winther:
Problematizing excessive online gaming and its psychological predictors. Comput. Hum. Behav. 31: 118-122 (2014) - Daniel Kardefelt-Winther:
A conceptual and methodological critique of internet addiction research: Towards a model of compensatory internet use. Comput. Hum. Behav. 31: 351-354 (2014) - Daniel L. King, Paul H. Delfabbro, Dean Kaptsis, Tara Zwaans:
Adolescent simulated gambling via digital and social media: An emerging problem. Comput. Hum. Behav. 31: 305-313 (2014)
skipping 42 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-21 16:15 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint