198 results on '"G Lutters"'
Search Results
2. Early Diffusion of Innovations with Quantum Computing.
3. Beyond iTunes for Papers: Redefining the Unit of Interaction in Literature Review Tools.
4. Motivating Cybersecurity Advocates: Implications for Recruitment and Retention.
5. Opening up the black box of scholarly synthesis: Intermediate products, processes, and tools.
6. This One Simple Trick Disrupts Digital Communities.
7. Understanding How Youth Employees Use Slack.
8. 'It's Scary...It's Confusing...It's Dull': How Cybersecurity Advocates Overcome Negative Perceptions of Security.
9. The Work of Cybersecurity Advocates.
10. Ethics for Studying Online Sociotechnical Systems in a Big Data World.
11. (Re)defining Land Change Science through Synthetic Research Practices.
12. The Solicitation Situation: Examining the Language of Team Science in Federally-Funded Research.
13. Skills and Characteristics of Successful Cybersecurity Advocates.
14. Collaborative interpretation in land change science meta-studies.
15. The militarization of teamwork in alternate reality gaming.
16. Understanding situated action in ludic ecologies.
17. Playing with leadership and expertise: military tropes and teamwork in an arg.
18. Designing a system for land change science meta-study.
19. Exploring infrastructure assemblage in volunteer virtual organizations.
20. Designing the future of collaborative workplace systems: lessons learned from a comparison with alternate reality games.
21. Again?!! The Emotional Experience of Social Notification Interruptions.
22. Promoting Reflective Learning: The Role of Blogs in the Classroom.
23. Interpreting User-Generated Content: What Makes a Blog Believeable?
24. The Future of Virtual Worlds.
25. Virtual Worlds for Virtual Organizing.
26. A view from Mount Olympus: the impact of activity tracking tools on the character and practice of moderation.
27. Structuring cross-organizational knowledge sharing.
28. Culturally Appropriate Acceptance Models for Civic Engagement Systems in Saudi Arabia.
29. 'Girls don't waste time': pre-adolescent attitudes toward ICT.
30. From the personal to the profound: understanding the blog life cycle.
31. Why use memo for all?: restructuring mobile applications to support informal note taking.
32. A user-centered approach to visualizing network traffic for intrusion detection.
33. I know my network: collaboration and expertise in intrusion detection.
34. Understanding the micronote lifecycle: improving mobile support for informal note taking.
35. Achieving safety: a field study of boundary objects in aircraft technical support.
36. Evaluating sense of community theory in civic engagement systems.
37. Transcending Knowledge Gaps in Virtual Teams: Social Processes of Rapid Problem-Solving Bounded by Terminology.
38. Examining ICT-Mediated Cultural Factors for Subgroup Impact on Virtual Team Dynamics.
39. Virtual Interfaces for Exploration of Heterogeneous & Cloud Computing Architectures.
40. Wiki anxiety: impediments to implementing wikis for IT support groups.
41. Towards a design theory for online communities.
42. Security Awareness Training for the Workforce: Moving Beyond 'Check-the-Box' Compliance
43. Using difference detail curves to assess image quality of low contrast abdominal CT scans
44. Perceived Faultline in Virtual Teams: The Impact of Norms of Technology Use.
45. Dating the Anthropocene: Towards an empirical global history of human transformation of the terrestrial biosphere
46. Mixed reality games.
47. Privacy implications for single sign-on authentication in a hospital environment.
48. Insightful illusions: requirements gathering for large-scale groupware systems.
49. Network authentication using single sign-on: the challenge of aligning mental models.
50. Towards virtualizing the helpdesk: assessing the relevance of knowledge across distance.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.