Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using alternate reality games to find a needle in a haystack: An approach for testing insider threat detection methods., , , , , , , , and . Comput. Secur., (2021)In-group/out-group effects in distributed teams: an experimental simulation., , , , and . CSCW, page 429-436. ACM, (2004)Emergent leadership in small groups using computer-mediated communication., , and . CSCL, page 138-143. International Society of the Learning Sciences, (2002)Design and evaluation challenges of serious games., and . CHI Extended Abstracts, page 2049-2050. ACM, (2005)From Shared Databases to Communities of Practice: A Taxonomy of Collaboratories., , , , , , and . J. Comput. Mediat. Commun., 12 (2): 652-672 (2007)Being there versus seeing there: trust via video., , , and . CHI Extended Abstracts, page 291-292. ACM, (2001)Effects of four computer-mediated communications channels on trust development., , , , and . CHI, page 135-140. ACM, (2002)Influencing Network Graph Perception and Judgment: Effects of Direct Connections, Base Rates, and Visual Layout Proximity on Social Network Analysis., , , , , and . CogSci, cognitivesciencesociety.org, (2017)Scientific Collaboration on the Internet, , and . MIT Press, (November 2008)Design principles for educational software., , , , and . CSCL, page 679-680. International Society of the Learning Sciences, (2002)