Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijmms/ijmms63.bht:"
@article{DBLP:journals/ijmms/AdamsB05, author = {Anne Adams and Ann Blandford}, title = {Bridging the gap between organizational and user perspectives of security in the clinical domain}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {1-2}, pages = {175--202}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.022}, doi = {10.1016/J.IJHCS.2005.04.022}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/AdamsB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/AngeliCJR05, author = {Antonella De Angeli and Lynne M. Coventry and Graham Johnson and Karen Renaud}, title = {Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {1-2}, pages = {128--152}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.020}, doi = {10.1016/J.IJHCS.2005.04.020}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/AngeliCJR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/BecklesWB05, author = {Bruce Beckles and Von Welch and Jim Basney}, title = {Mechanisms for increasing the usability of grid security}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {1-2}, pages = {74--101}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.017}, doi = {10.1016/J.IJHCS.2005.04.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmms/BecklesWB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/BerryBR05, author = {Dianne C. Berry and Laurie T. Butler and Fiorella de Rosis}, title = {Evaluating a realistic agent in an advice-giving task}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {3}, pages = {304--327}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.03.006}, doi = {10.1016/J.IJHCS.2005.03.006}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/BerryBR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/BonnardelC05, author = {Nathalie Bonnardel and Evelyne Cauzinille{-}Marm{\`{e}}che}, title = {Towards supporting evocation processes in creative design: {A} cognitive approach}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {4-5}, pages = {422--435}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.006}, doi = {10.1016/J.IJHCS.2005.04.006}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/BonnardelC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/Burleson05, author = {Winslow Burleson}, title = {Developing creativity, motivation, and self-actualization with learning systems}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {4-5}, pages = {436--451}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.007}, doi = {10.1016/J.IJHCS.2005.04.007}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/Burleson05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/DuezV05, author = {Pierre P. Duez and Kim J. Vicente}, title = {Ecological interface design and computer network management: The effects of network size and fault frequency}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {6}, pages = {565--586}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.05.001}, doi = {10.1016/J.IJHCS.2005.05.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/DuezV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/EdmondsC05, author = {Ernest A. Edmonds and Linda Candy}, title = {Computer support for creativity}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {4-5}, pages = {363--364}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.001}, doi = {10.1016/J.IJHCS.2005.04.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/EdmondsC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/EdmondsWCFKP05, author = {Ernest A. Edmonds and Alastair Weakley and Linda Candy and Mark Fell and Roger Knott and Sandra Pauletto}, title = {The studio as laboratory: Combining creative practice and digital technology research}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {4-5}, pages = {452--481}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.012}, doi = {10.1016/J.IJHCS.2005.04.012}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/EdmondsWCFKP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/FischerGESY05, author = {Gerhard Fischer and Elisa Giaccardi and Hal Eden and Masanori Sugimoto and Yunwen Ye}, title = {Beyond binary choices: Integrating individual and social creativity}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {4-5}, pages = {482--512}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.014}, doi = {10.1016/J.IJHCS.2005.04.014}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/FischerGESY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/Hewett05, author = {Thomas T. Hewett}, title = {Informing the design of computer-based environments to support creativity}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {4-5}, pages = {383--409}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.004}, doi = {10.1016/J.IJHCS.2005.04.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/Hewett05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/JensenPJ05, author = {Carlos Jensen and Colin Potts and Christian Jensen}, title = {Privacy practices of Internet users: Self-reports versus observed behavior}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {1-2}, pages = {203--227}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.019}, doi = {10.1016/J.IJHCS.2005.04.019}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/JensenPJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/JonesJMPC05, author = {Steve Jones and Matt Jones and Gary Marsden and Dynal Patel and Andy Cockburn}, title = {An evaluation of integrated zooming and scrolling on small screens}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {3}, pages = {271--303}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.03.005}, doi = {10.1016/J.IJHCS.2005.03.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/JonesJMPC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/KaratKB05, author = {Clare{-}Marie Karat and John Karat and Carolyn Brodie}, title = {Why {HCI} research in privacy and security is critical now}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {1-2}, pages = {1--4}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.016}, doi = {10.1016/J.IJHCS.2005.04.016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmms/KaratKB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/KaratKBF05, author = {John Karat and Clare{-}Marie Karat and Carolyn Brodie and Jinjuan Feng}, title = {Privacy in information technology: Designing to enable privacy policy management in organizations}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {1-2}, pages = {153--174}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.011}, doi = {10.1016/J.IJHCS.2005.04.011}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/KaratKBF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/KlineS05, author = {Rex Bryan Kline and Ahmed Seffah}, title = {Evaluation of integrated software development environments: Challenges and results from three empirical studies}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {6}, pages = {607--627}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.05.002}, doi = {10.1016/J.IJHCS.2005.05.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/KlineS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/LeeHW05, author = {Ying{-}Lien Lee and Sheue{-}Ling Hwang and Eric Min{-}Yang Wang}, title = {Reducing cognitive workload of a computer-based procedure system}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {6}, pages = {587--606}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.05.003}, doi = {10.1016/J.IJHCS.2005.05.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/LeeHW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/LittleBC05, author = {Linda Little and Pamela Briggs and Lynne M. Coventry}, title = {Public space systems: Designing for privacy?}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {1-2}, pages = {254--268}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.018}, doi = {10.1016/J.IJHCS.2005.04.018}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/LittleBC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/Lubart05, author = {Todd Lubart}, title = {How can computers be partners in the creative process: Classification and commentary on the Special Issue}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {4-5}, pages = {365--369}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.002}, doi = {10.1016/J.IJHCS.2005.04.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/Lubart05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/MaxionR05, author = {Roy A. Maxion and Robert W. Reeder}, title = {Improving user-interface dependability through mitigation of human error}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {1-2}, pages = {25--50}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.009}, doi = {10.1016/J.IJHCS.2005.04.009}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/MaxionR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/NorrosN05, author = {Leena Norros and Maaria Nuutinen}, title = {Performance-based usability evaluation of a safety information and alarm system}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {3}, pages = {328--361}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.03.004}, doi = {10.1016/J.IJHCS.2005.03.004}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmms/NorrosN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/PaulaDDNPRRRF05, author = {Rog{\'{e}}rio de Paula and Xianghua Ding and Paul Dourish and Kari Nies and Ben Pillet and David F. Redmiles and Jie Ren and Jennifer Ann Rode and Luiz Roberto Silva Filho}, title = {In the eye of the beholder: {A} visualization-based approach to information system security}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {1-2}, pages = {5--24}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.021}, doi = {10.1016/J.IJHCS.2005.04.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmms/PaulaDDNPRRRF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/PriceAN05, author = {Blaine A. Price and Karim Adam and Bashar Nuseibeh}, title = {Keeping ubiquitous computing to yourself: {A} practical model for user control of privacy}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {1-2}, pages = {228--253}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.008}, doi = {10.1016/J.IJHCS.2005.04.008}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/PriceAN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/RothSR05, author = {Volker Roth and Tobias Straub and Kai Richter}, title = {Security and usability engineering with particular attention to electronic mail}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {1-2}, pages = {51--73}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.015}, doi = {10.1016/J.IJHCS.2005.04.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmms/RothSR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/Selker05, author = {Ted Selker}, title = {Fostering motivation and creativity for computer users}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {4-5}, pages = {410--421}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.005}, doi = {10.1016/J.IJHCS.2005.04.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/Selker05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/SjolinderHNA05, author = {Marie Sj{\"{o}}linder and Kristina H{\"{o}}{\"{o}}k and Lars{-}G{\"{o}}ran Nilsson and Gerd Andersson}, title = {Age differences and the acquisition of spatial knowledge in a three-dimensional environment: Evaluating the use of an overview map as a navigation aid}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {6}, pages = {537--564}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.024}, doi = {10.1016/J.IJHCS.2005.04.024}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/SjolinderHNA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/Sternberg05, author = {Robert J. Sternberg}, title = {Creativity or creativities?}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {4-5}, pages = {370--382}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.003}, doi = {10.1016/J.IJHCS.2005.04.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/Sternberg05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/WiedenbeckWBBM05, author = {Susan Wiedenbeck and Jim Waters and Jean{-}Camille Birget and Alex Brodskiy and Nasir D. Memon}, title = {PassPoints: Design and longitudinal evaluation of a graphical password system}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {1-2}, pages = {102--127}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.010}, doi = {10.1016/J.IJHCS.2005.04.010}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/WiedenbeckWBBM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/YamamotoN05, author = {Yasuhiro Yamamoto and Kumiyo Nakakoji}, title = {Interaction design of tools for fostering creativity in the early stages of information design}, journal = {Int. J. Hum. Comput. Stud.}, volume = {63}, number = {4-5}, pages = {513--535}, year = {2005}, url = {https://doi.org/10.1016/j.ijhcs.2005.04.023}, doi = {10.1016/J.IJHCS.2005.04.023}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/YamamotoN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.