The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ron Henderson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kylie O'Hare, Ron Henderson
    Acceptance of computers in human roles. [Citation Graph (0, 0)][DBLP]
    INTERACT, 1997, pp:579-580 [Conf]
  2. Peter Roberts, Ron Henderson, Debra Rickwood
    Assessment of modal beliefs about using an electronic supermarket. [Citation Graph (0, 0)][DBLP]
    INTERACT, 1997, pp:577-578 [Conf]
  3. Julie Bunnell, John Podd, Ron Henderson, Renee Napier, James Kennedy-Moffat
    Cognitive, associative and conventional passwords: Recall and guessing rates. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:7, pp:629-641 [Journal]
  4. Frank Deane, Kate Barrelle, Ron Henderson, Doug Mahar
    Perceived acceptability of biometric security systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:3, pp:225-231 [Journal]
  5. Rachael Pond, John Podd, Julie Bunnell, Ron Henderson
    Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:645-656 [Journal]
  6. Kate Barrelle, William Laverty, Ron Henderson, Jon Gough, Michael Wagner, Michael Hiron
    User verification through pointing characteristics: an exploration examination. [Citation Graph (0, 0)][DBLP]
    Int. J. Hum.-Comput. Stud., 1996, v:45, n:1, pp:47-57 [Journal]
  7. Ron Henderson, Megan J. Divett
    Perceived usefulness, ease of use and electronic supermarket use. [Citation Graph (0, 0)][DBLP]
    Int. J. Hum.-Comput. Stud., 2003, v:59, n:3, pp:383-395 [Journal]
  8. Ron Henderson, Doug Mahar, Anthony Saliba, Frank Deane, Renee Napier
    Electronic monitoring systems: an examination of physiological activity and task performance within a simulated keystroke security and electronic performance monitoring sytem. [Citation Graph (0, 0)][DBLP]
    Int. J. Hum.-Comput. Stud., 1998, v:48, n:2, pp:143-157 [Journal]
  9. Doug Mahar, Renee Napier, Michael Wagner, William Laverty, Ron Henderson, Michael Hiron
    Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions. [Citation Graph (0, 0)][DBLP]
    Int. J. Hum.-Comput. Stud., 1995, v:43, n:4, pp:579-592 [Journal]
  10. Renee Napier, William Laverty, Doug Mahar, Ron Henderson, Michael Hiron, Michael Wagner
    Keyboard user verification: toward an accurate, efficient, and ecologically valid algorithm. [Citation Graph (0, 0)][DBLP]
    Int. J. Hum.-Comput. Stud., 1995, v:43, n:2, pp:213-222 [Journal]
  11. Frank Deane, Ron Henderson, Doug Mahar, Anthony Saliba
    Theoretical Examination of the Effects of Anxiety and Electronic Performance Monitoring on Behavioural Biometric Security Systems. [Citation Graph (0, 0)][DBLP]
    Interacting with Computers, 1995, v:7, n:4, pp:395-411 [Journal]
  12. Ron Henderson, Frank Deane, Kate Barrelle, Doug Mahar
    Computer Anxiety: Correlates, Norms and Problem Definition in Health Care and Banking Employees using the Computer Attitude Scale. [Citation Graph (0, 0)][DBLP]
    Interacting with Computers, 1995, v:7, n:2, pp:181-193 [Journal]
  13. Ron Henderson, John Podd, Mike Smith, Hugo Varela-Alvarez
    An Examination of Four User-Based Software Evaluation Methods. [Citation Graph (0, 0)][DBLP]
    Interacting with Computers, 1995, v:7, n:4, pp:412-432 [Journal]
  14. Ron Henderson, Debra Rickwood, Peter Roberts
    The beta test of an electronic supermarket. [Citation Graph (0, 0)][DBLP]
    Interacting with Computers, 1998, v:10, n:4, pp:385-399 [Journal]
  15. Doug Mahar, Ron Henderson, William Laverty, Renee Napier
    The effects of password length and reference profile size on the performance of a multivariate text-dependent typist verification system. [Citation Graph (0, 0)][DBLP]
    Interacting with Computers, 1998, v:10, n:4, pp:375-383 [Journal]
  16. Peter Roberts, Ron Henderson
    Information technology acceptance in a sample of government employees: a test of the technology acceptance model. [Citation Graph (0, 0)][DBLP]
    Interacting with Computers, 2000, v:12, n:5, pp:427-443 [Journal]

Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002