Search for persons
X
?
Lecture Notes in Computer Science; Information for a Better World: Normality, Virtuality, Physicality, Inclusivity ,
2
Do You Speak Meme? A Dynamic Digital Language for the Infor..:
, In:
?
2023 IEEE International Conference on Big Data (BigData) ,
3
Enhancing Object Detection in YouTube Thumbnails Forensics ..:
, In:
?
Sustainable Digital Communities; Lecture Notes in Computer Science ,
4
"On the left side, there's nothing right. On the right side..:
, In:
?
HCI in Business, Government and Organizations. Information Systems and Analytics; Lecture Notes in Computer Science ,
5
Consciousness of Cyber Defense: Boundary Objects for Expans..:
, In:
?
HCI in Business, Government and Organizations. Information Systems and Analytics; Lecture Notes in Computer Science ,
6
The Privacy Paradox in HCI: Calculus Behavior in Disclosing..:
, In:
?
2015 IEEE International Conference on Intelligence and Security Informatics (ISI) ,
7
Liar, Liar, IM on Fire: Deceptive language-action cues in s..:
, In:
?
Proceedings of the 2015 Winter Simulation Conference ,
8
An online game simulation environment for detecting potenti..:
, In:
?
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research ,
9
Panel : Cybersecurity Workforce Development:
, In:
?
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research ,
10
Insider Threat : Language-action Cues in Group Dynamics:
, In:
?
Proceedings of the ACM 2011 conference on Computer supported cooperative work ,
11
i-sensor inference model for assessing trustworthiness in c..:
, In:
?
Advances in Government Enterprise Architecture ,
12
Enterprise Architecture as Context and Method for Designing..:
, In:
?
Social Computing and Behavioral Modeling ,
13
A Socio-Technical Approach to Understanding Perceptions of ..:
, In:
?
Social Computing, Behavioral Modeling, and Prediction ,
14
Attribution-based Anomaly Detection: Trustworthiness in an ..:
, In:
?
Cyber Warfare and Cyber Terrorism ,
15