Vincent Koenig
Titel
Zitiert von
Zitiert von
Jahr
User experience: A concept without consensus? Exploring practitioners’ perspectives through an international survey
C Lallemand, G Gronier, V Koenig
Computers in Human Behavior 43, 35-48, 2015
2382015
Création et validation d’une version française du questionnaire AttrakDiff pour l’évaluation de l’expérience utilisateur des systèmes interactifs
C Lallemand, V Koenig, G Gronier, R Martin
European Review of Applied Psychology 65 (5), 239-252, 2015
952015
Concept maps: A useful and usable tool for computer-based knowledge assessment? A literature review with a focus on usability
K Weinerth, V Koenig, M Brunner, R Martin
Computers & Education 78, 201-209, 2014
822014
Gaming concepts and incentives to change driver behaviour
R McCall, V Koenig
2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net …, 2012
462012
Security-Visible, Yet Unseen?
V Distler, ML Zollinger, C Lallemand, PB Roenne, PYA Ryan, V Koenig
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
33*2019
How relevant is an expert evaluation of user experience based on a psychological needs-driven approach?
C Lallemand, V Koenig, G Gronier
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun …, 2014
302014
Security-visible, yet unseen? How displaying security mechanisms impacts user experience and perceived security
V Distler, ML Zollinger, C Lallemand, PB Roenne, PYA Ryan, V Koenig
2019 CHI Conference on Human Factors in Computing Systems, CHI 2019: ACM CHI …, 2019
282019
Lab testing beyond usability: Challenges and recommendations for assessing user experiences
C Lallemand, V Koenig
Journal of Usability Studies 12 (3), 133-154, 2017
212017
Socio-technical security analysis of wireless hotspots
A Ferreira, JL Huynen, V Koenig, G Lenzini
International Conference on Human Aspects of Information Security, Privacy …, 2014
202014
Using gamification and metaphor to design a mobility platform for commuters
R McCall, V Koenig, M Kracheel
International Journal of Mobile Human Computer Interaction (IJMHCI) 5 (1), 1-15, 2013
202013
How Could an Intranet be Like a Friend to Me?: Why Standardized UX Scales Don't Always Fit
C Lallemand, V Koenig
Proceedings of the European Conference on Cognitive Ergonomics 2017, 9-16, 2017
182017
Socio-technical study on the effect of trust and context when choosing wifi names
A Ferreira, JL Huynen, V Koenig, G Lenzini, S Rivas
International Workshop on Security and Trust Management, 131-143, 2013
172013
A conceptual framework to study socio-technical security
A Ferreira, JL Huynen, V Koenig, G Lenzini
International Conference on Human Aspects of Information Security, Privacy …, 2014
162014
How acceptable is this? How user experience factors can broaden our understanding of the acceptance of privacy trade-offs
V Distler, C Lallemand, V Koenig
Computers in Human Behavior, 106227, 2019
152019
Driving while using a smartphone-based mobility application: Evaluating the impact of three multi-choice user interfaces on visual-manual distraction
N Louveton, R McCall, V Koenig, T Avanesov, T Engel
Applied Ergonomics 54, 196-204, 2016
132016
MaDSAV: maintaining driving skills in semi-autonomous vehicles
A Meschtscherjakov, R McCall, N Louveton, T Engel, M Tscheligi, ...
Adjunct Proceedings of the 7th International Conference on Automotive User …, 2015
112015
Towards a Simple City Driving Simulator Based on Speed Dreams and OSM
T Avanesov, N Louveton, R McCall, V Koenig, M Kracheel
Adjunct Proceedings of the 4th International Conference on Automotive User …, 2012
112012
Do graphical cues effectively inform users?
A Ferreira, JL Huynen, V Koenig, G Lenzini, S Rivas
International Conference on Human Aspects of Information Security, Privacy …, 2015
102015
Pervasive gaming as a potential solution to traffic congestion: new challenges regarding ethics, privacy and trust
V Koenig, F Boehm, R McCall
International Conference on Entertainment Computing, 586-593, 2012
92012
In Cyber-Space No One Can Hear You S· CREAM
A Ferreira, JL Huynen, V Koenig, G Lenzini
Security and Trust Management, 255-264, 2015
82015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20