Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring the Cost of Cybercrimes.. ERCIM News, (2012)Optimal 1D Ly$\alpha$ Forest Power Spectrum Estimation -- II. KODIAQ, SQUAD & XQ-100, , , , , , , , , and 2 other author(s). (2021)cite arxiv:2108.10870.Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)., , , , , , , and . WWW (Companion Volume), page 1311-1314. ACM, (2017)Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space., and . Inf. Manag. Comput. Secur., 21 (5): 420-443 (2013)Local primordial non-Gaussianity from the large-scale clustering of photometric DESI luminous red galaxies., , , , , , , , , and 38 other author(s). CoRR, (2023)Interacting with statistics - report from a workshop at CHI 99., and . ACM SIGCHI Bull., 31 (4): 31-35 (1999)Usability testing of World Wide Web sites: a CHI 97 workshop., and . ACM SIGCHI Bull., 29 (4): 40-43 (1997)Digital government information services: the Bureau of Labor statistics case., and . Interactions, 10 (4): 18-27 (2003)Interacting with statistics: designing interfaces to statistical databases., and . CHI Extended Abstracts, page 168. ACM, (1999)A heuristic evaluation of a World Wide Web prototype., and . Interactions, 3 (4): 50-61 (1996)