M. Angela Sasse

Orcid: 0000-0003-1823-5505

Affiliations:
  • Ruhr University Bochum, Bochum, Germany (since 2018)
  • University College London (UCL), Department of Computer Science, London, UK
  • University of Birmingham, Birmingham, UK


According to our database1, M. Angela Sasse authored at least 172 papers between 1989 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

2023
"Employees Who Don't Accept the Time Security Takes Are Not Aware Enough": The CISO View of Human-Centred Security.
Proceedings of the 32nd USENIX Security Symposium, 2023

"To Do This Properly, You Need More Resources": The Hidden Costs of Introducing Simulated Phishing Campaigns.
Proceedings of the 32nd USENIX Security Symposium, 2023

Lacking the Tools and Support to Fix Friction: Results from an Interview Study with Security Managers.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Caring Not Scaring - An Evaluation of a Workshop to Train Apprentices as Security Champions.
Proceedings of the 2023 European Symposium on Usable Security, 2023

Security Champions Without Support: Results from a Case Study with OWASP SAMM in a Large-Scale E-Commerce Enterprise.
Proceedings of the 2023 European Symposium on Usable Security, 2023

"As Usual, I Needed Assistance of a Seeing Person": Experiences and Challenges of People with Disabilities and Authentication Methods.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies.
CoRR, 2022

Getting Users Smart Quick about Security: Results from 90 Minutes of Using a Persuasive Toolkit for Facilitating Information Security Problem Solving by Non-Professionals.
CoRR, 2022

How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Inclusive Security by Design.
Proceedings of the Mensch und Computer 2022 - Workshopband, Darmstadt, Germany, September 4, 2022

Putting Security on the Table: The Digitalisation of Security Tabletop Games and its Challenging Aftertaste.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering Education and Training, 2022

Caring About IoT-Security - An Interview Study in the Healthcare Sector.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

Rebooting IT Security Awareness - How Organisations Can Encourage and Sustain Secure Behaviours.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
Bringing Crypto Knowledge to School: Examining and Improving Junior High School Students' Security Assumptions About Encrypted Chat Apps.
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021

"Taking out the Trash": Why Security Behavior Change requires Intentional Forgetting.
Proceedings of the NSPW '21: New Security Paradigms Workshop, Virtual Event, USA, October 25, 2021

Peeking Into the Black Box: Towards Understanding User Understanding of E2EE.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

Microsoft Office Macro Warnings: A Design Comedy of Errors with Tragic Security Consequences.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

Why IT Security Needs Therapy.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers.
Softw. Pract. Exp., 2020

Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness.
Datenschutz und Datensicherheit, 2020

Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Analysing Simulated Phishing Campaigns for Staff.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Authentication Beyond Desktops and Smartphones: Novel Approaches for Smart Devices and Environments.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

2019
IT-Sicherheit ist mehr als Technik.
Datenschutz und Datensicherheit, 2019

Cyber Security Awareness Campaigns: Why do they fail to change behaviour?
CoRR, 2019

Factors influencing users to use unsecured wi-fi networks: evidence in the wild.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Why Jenny can't figure out which of these messages is a covert information operation.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

Asset-Oriented Access Control: Towards a New IoT Framework.
Proceedings of the 9th International Conference on the Internet of Things, 2019

Interventions for software security: creating a lightweight program of assurance techniques for developers.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019

2 Fast 2 Secure: A Case Study of Post-Breach Security Changes.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

2018
Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr.
Proc. ACM Hum. Comput. Interact., 2018

Studying users' adaptation to Android's run-time fine-grained access control system.
J. Inf. Secur. Appl., 2018

The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength.
Proceedings of the 27th USENIX Security Symposium, 2018

Light-Touch Interventions to Improve Software Development Security.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

2017
International comparison of bank fraud reimbursement: customer perceptions and contractual terms.
J. Cybersecur., 2017

Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF).
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Obstacles to the Adoption of Secure Communication Tools.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

"No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
Debunking Security-Usability Tradeoff Myths.
IEEE Secur. Priv., 2016

The Security-Usability Tradeoff Myth [Guest editors' introduction].
IEEE Secur. Priv., 2016

Barriers to Usable Security? Three Organizational Case Studies.
IEEE Secur. Priv., 2016

Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens.
CoRR, 2016

The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions.
CoRR, 2016

Permissions snapshots: Assessing users' adaptation to the Android runtime permission model.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions.
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016

Applying Cognitive Control Modes to Identify Security Fatigue Hotspots.
Proceedings of the Workshop on Security Fatigue, 2016

Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

"I don't like putting my face on the Internet!": An acceptance study of face biometrics as a CAPTCHA replacement.
Proceedings of the IEEE International Conference on Identity, 2016

Are Payment Card Contracts Unfair? (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
"Shadow security" as a tool for the learning organization.
SIGCAS Comput. Soc., 2015

Scaring and Bullying People into Security Won't Work.
IEEE Secur. Priv., 2015

"They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking.
CoRR, 2015

Deception in Online Auction Marketplaces: Incentives and Personality Shape Seller Honesty.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Assessing the User Experience of Password Reset Policies in a University.
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

Employee Rule Breakers, Excuse Makers and Security Champions: : Mapping the risk perceptions and emotions that drive security behaviors.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

"Too Taxing on the Mind!" Authentication Grids are not for Everyone.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

POSTER: Secure Chat for the Masses? User-centered Security to the Rescue.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Helping You Protect You.
IEEE Secur. Priv., 2014

Protecting You.
IEEE Secur. Priv., 2014

Socio-Technical Security Metrics (Dagstuhl Seminar 14491).
Dagstuhl Reports, 2014

Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Desperately seeking assurances: Segmenting users by their information-seeking preferences.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

The Great Authentication Fatigue - And How to Overcome It.
Proceedings of the Cross-Cultural Design, 2014

What Usable Security Really Means: Trusting and Engaging Users.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Towards a Simulation of Information Security Behaviour in Organisations.
Proceedings of the Cyberpatterns, 2014

2013
'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312).
Dagstuhl Reports, 2013

CISOs and organisational culture: Their own worst enemy?
Comput. Secur., 2013

"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

"Technology Should Be Smarter Than This!": A Vision for Overcoming the Great Authentication Fatigue.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents.
Proceedings of the Financial Cryptography and Data Security, 2013

How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization.
Proceedings of the 21st European Conference on Information Systems, 2013

Federated identity to access e-government services: are citizens ready for this?
Proceedings of the DIM'13, 2013

Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Security Education against Phishing: A Modest Proposal for a Major Rethink.
IEEE Secur. Priv., 2012

Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Why Trust Seals Don't Work: A Study of User Perceptions and Behavior.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Guiding decisions on authorization policies: a participatory approach to decision support.
Proceedings of the ACM Symposium on Applied Computing, 2012

Privacy is a process, not a PET: a theory for effective privacy practice.
Proceedings of the New Security Paradigms Workshop, 2012

Don't work. Can't work? Why it's time to rethink security warnings.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Too close for comfort: a study of the effectiveness and acceptability of rich-media personalized advertising.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

When did my mobile turn into a 'sellphone'?: a study of consumer responses to tailored smartphone ads.
Proceedings of the BCS-HCI '12 Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers, 2012

Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider.
Proceedings of the European Data Protection: In Good Health?, 2012

Privacy for Loan Applicants Versus Predictive Power for Loan Providers: Is It Possible to Bridge the Gap?
Proceedings of the European Data Protection: In Good Health?, 2012

2011
Eliciting and modelling expertise for serious games in project management.
Entertain. Comput., 2011

Trusting to Learn: Trust and Privacy Issues in Serious Games.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Information security as organizational power: A framework for re-thinking security policies.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication.
Proceedings of the 5th International Conference on Network and System Security, 2011

Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Do you know dis?: a user study of a knowledge discovery tool for organizations.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Not seeing the crime for the cameras?
Commun. ACM, 2010

A stealth approach to usable security: helping IT security managers to identify workable security solutions.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

The true cost of unusable password policies: password use in the wild.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Evaluating the usability and security of a graphical one-time PIN system.
Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, 2010

2009
The big picture on small screens delivering acceptable video quality in mobile TV.
ACM Trans. Multim. Comput. Commun. Appl., 2009

Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science.
Int. J. Hum. Comput. Stud., 2009

Designing and evaluating usable security and privacy technology.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Exploring blog spaces: a study of blog reading experiences using dynamic contextual displays.
Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, 2009

Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
How low can you go? The effect of low resolutions on shot types in mobile TV.
Multim. Tools Appl., 2008

Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Expressions of expertness: the virtuous circle of natural language for access control policy specification.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

The compliance budget: managing security behaviour in organisations.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

The sweet spot: how people trade off size and definition on mobile devices.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

To catch a thief - you need at least 8 frames per second: the impact of frame rates on user performance in a CCTV detection task.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

The challenges faced by academia preparing students for industry: what we teach and what we do.
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008

2007
Integrating security and usability into the requirements and design process.
Int. J. Electron. Secur. Digit. Forensics, 2007

Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems.
IEEE Secur. Priv., 2007

The kindest cut: enhancing the user experience of mobile tv through adequate zooming.
Proceedings of the 15th International Conference on Multimedia 2007, 2007

Contextualizing the blogosphere: a comparison of traditional and novel user interfaces for the web.
Proceedings of the 21st British HCI Group Annual Conference on HCI 2007: HCI...but not as we know it, 2007

GazeSpace: eye gaze controlled content spaces.
Proceedings of the 21st British HCI Group Annual Conference on HCI 2007: HCI...but not as we know it, 2007

Usability is the best policy: public policy and the lived experience of transport systems in London.
Proceedings of the 21st British HCI Group Annual Conference on HCI 2007: HCI...but not as we know it, 2007

"The devil you know knows best": how online recommendations can benefit from social networking.
Proceedings of the 21st British HCI Group Annual Conference on HCI 2007: HCI...but not as we know it, 2007

2006
Reading the fine print: the effect of text legibility on perceived video quality in mobile tv.
Proceedings of the 14th ACM International Conference on Multimedia, 2006

Personalised Focus-Metaphor Interfaces: An Eye Tracking Study on User Confusion.
Proceedings of the Mensch und Computer 2006: Mensch und Computer im Strukturwandel, 2006

Accounting for taste: using profile similarity to improve recommender systems.
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2005
'R-What?' Development of a role-based access control policy-writing tool for e-Scientists.
Softw. Pract. Exp., 2005

The mechanics of trust: A framework for research and design.
Int. J. Hum. Comput. Stud., 2005

Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems.
Proceedings of the New Security Paradigms Workshop 2005, 2005

Designing a large-scale video chat application.
Proceedings of the 13th ACM International Conference on Multimedia, 2005

Can small be beautiful?: assessing image resolution requirements for mobile TV.
Proceedings of the 13th ACM International Conference on Multimedia, 2005

Do people trust their eyes more than ears?: media bias in detecting cues of expertise.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

Rich Media, Poor Judgement? A Study of Media Effects on Users' Trust in Expertise.
Proceedings of the People and Computers XIX, 2005

"I thought it was terrible and everyone else loved it" - A New Perspective for Effective Recommender System Design.
Proceedings of the People and Computers XIX, 2005

2004
From doing to being: getting closer to the user experience.
Interact. Comput., 2004

Considering the user in the wireless world.
IEEE Commun. Mag., 2004

Sharp or smooth?: comparing the effects of quantization vs. frame rate for streamed video.
Proceedings of the 2004 Conference on Human Factors in Computing Systems, 2004

"Stuff goes into the computer and doesn't come out": a cross-tool study of personal information management.
Proceedings of the 2004 Conference on Human Factors in Computing Systems, 2004

The Geometry of Web Search.
Proceedings of the People and Computers XVIII, 2004

2003
The researcher's dilemma: evaluating trust in computer-mediated communication.
Int. J. Hum. Comput. Stud., 2003

Bringing security home: a process for developing secure and usable systems.
Proceedings of the New Security Paradigms Workshop 2003, 2003

Shiny happy people building trust?: photos on e-commerce websites and consumer trust.
Proceedings of the 2003 Conference on Human Factors in Computing Systems, 2003

The impact of avatar realism and eye gaze control on perceived quality of communication in a shared immersive virtual environment.
Proceedings of the 2003 Conference on Human Factors in Computing Systems, 2003

2002
How Web browsers shape users' understanding of networks.
Electron. Libr., 2002

Eye-Catcher of Blind Spot? The Effect of Photographs of Faces on eCommerce Sites.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002

Face it - photos don't make a web site trustworthy.
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002

2001
Pretty good persuasion: a first step towards effective password security in the real world.
Proceedings of the New Security Paradigms Workshop 2001, 2001

Safe and sound: a safety-critical approach to security.
Proceedings of the New Security Paradigms Workshop 2001, 2001

Why Value Is Everything: A User-Centered Approach to Internet Quality of Service and Pricing.
Proceedings of the Quality of Service, 2001

Trustbuilders and Trustbusters - The Role of Trust Cues in Interfaces to e-Commerce Applications.
Proceedings of the Towards The E-Society: E-Commerce, 2001

Designing QoS and Charging Mechanisms: He who pays the service shapes the design.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001

Persuasive password security.
Proceedings of the CHI 2001 Extended Abstracts on Human Factors in Computing Systems, 2001

The impact of eye gaze on communication using humanoid avatars.
Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31, 2001

Privacy in Multimedia Communications: Protecting Users, Not Just Data.
Proceedings of the People and Computers XV, 2001

2000
The good, the bad, and the muffled: the impact of different degradations on Internet speech.
Proceedings of the 8th ACM International Conference on Multimedia 2000, Los Angeles, CA, USA, October 30, 2000

The head or the heart?: measuring the impact of media quality.
Proceedings of the CHI '00 Extended Abstracts on Human Factors in Computing Systems, 2000

Distance education via IP videoconferencing: results from a national pilot project.
Proceedings of the CHI '00 Extended Abstracts on Human Factors in Computing Systems, 2000

Do Users Always Know What's Good For Them? Utilising Physiological Responses to Assess Media Quality.
Proceedings of the People and Computers XIV - Usability or Else!, 2000

Are Passfaces More Usable Than Passwords? A Field Trial Investigation.
Proceedings of the People and Computers XIV - Usability or Else!, 2000

1999
Users Are Not The Enemy.
Commun. ACM, 1999

Taming the wolf in sheep's clothing: privacy in multimedia communications.
Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30, 1999

Listen to Your Heart Rate: Counting the Cost of Media Quality.
Proceedings of the Affective Interactions, 1999

Examining Users' Repertoire of Internet Applications.
Proceedings of the Human-Computer Interaction INTERACT '99: IFIP TC13 International Conference on Human-Computer Interaction, 1999

Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie?
Proceedings of the Human-Computer Interaction INTERACT '99: IFIP TC13 International Conference on Human-Computer Interaction, 1999

It Ain't What You Charge, It's The Way That You Do It: A User Perspective of Network QoS and Pricing.
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999

1998
Successful Multiparty Audio Communication over the Internet.
Commun. ACM, 1998

Measuring Perceived Quality of Speech and Video in Multimedia Conferencing Applications.
Proceedings of the 6th ACM International Conference on Multimedia '98, 1998

1997
Eliciting and describing users' models of computer systems.
PhD thesis, 1997

Conceptual Design Reconsidered: The Case of the Internet Session Directory Tool.
Proceedings of the People and Computers XII, Proceedings of HCI '97, 1997

Making Passwords Secure and Usable.
Proceedings of the People and Computers XII, Proceedings of HCI '97, 1997

1996
Evaluating Audio and Video Quality in Low-Cost Multimedia Conferencing Systems.
Interact. Comput., 1996

1994
International Research Seminars through Multimedia Conferencing: Experiences from the MICE project.
Proceedings of the Broadband Islands '94, 1994

1993
Multimedia Integrated Conferencing for European Researchers (MICE): Piloting Activities and the Conference Management and Multiplexing Centre.
Comput. Networks ISDN Syst., 1993

Support for Collaborative Authoring via Electronic Mail: The MESSIE Environment.
Proceedings of the Third European Conference on Computer Supported Cooperative Work, 1993

1991
Book Review: "Cognitive Ergonomics and Human-Computer Interaction, " edited by J. Long and A. Whitefield.
Int. J. Man Mach. Stud., 1991

1989
How to t(r)ap user's mental models.
Proceedings of the Mental Models and Human-Computer Interaction 2 [selected papers of the 8th Interdisciplinary Workshop in Informatics and Psychology, 1989


  Loading...