Vincent Koenig
Title
Cited by
Cited by
Year
User experience: A concept without consensus? Exploring practitioners’ perspectives through an international survey
C Lallemand, G Gronier, V Koenig
Computers in Human Behavior 43, 35-48, 2015
2512015
Création et validation d’une version française du questionnaire AttrakDiff pour l’évaluation de l’expérience utilisateur des systèmes interactifs
C Lallemand, V Koenig, G Gronier, R Martin
European Review of Applied Psychology 65 (5), 239-252, 2015
962015
Concept maps: A useful and usable tool for computer-based knowledge assessment? A literature review with a focus on usability
K Weinerth, V Koenig, M Brunner, R Martin
Computers & Education 78, 201-209, 2014
822014
Gaming concepts and incentives to change driver behaviour
R McCall, V Koenig
2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net …, 2012
462012
Security-Visible, Yet Unseen?
V Distler, ML Zollinger, C Lallemand, PB Roenne, PYA Ryan, V Koenig
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
36*2019
How relevant is an expert evaluation of user experience based on a psychological needs-driven approach?
C Lallemand, V Koenig, G Gronier
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun …, 2014
322014
Security-visible, yet unseen? How displaying security mechanisms impacts user experience and perceived security
V Distler, ML Zollinger, C Lallemand, PB Roenne, PYA Ryan, V Koenig
2019 CHI Conference on Human Factors in Computing Systems, CHI 2019: ACM CHI …, 2019
292019
Lab testing beyond usability: Challenges and recommendations for assessing user experiences
C Lallemand, V Koenig
Journal of Usability Studies 12 (3), 133-154, 2017
222017
Socio-technical security analysis of wireless hotspots
A Ferreira, JL Huynen, V Koenig, G Lenzini
International Conference on Human Aspects of Information Security, Privacy …, 2014
202014
Using gamification and metaphor to design a mobility platform for commuters
R McCall, V Koenig, M Kracheel
International Journal of Mobile Human Computer Interaction (IJMHCI) 5 (1), 1-15, 2013
202013
How Could an Intranet be Like a Friend to Me?: Why Standardized UX Scales Don't Always Fit
C Lallemand, V Koenig
Proceedings of the European Conference on Cognitive Ergonomics 2017, 9-16, 2017
182017
Socio-technical study on the effect of trust and context when choosing wifi names
A Ferreira, JL Huynen, V Koenig, G Lenzini, S Rivas
International Workshop on Security and Trust Management, 131-143, 2013
182013
How acceptable is this? How user experience factors can broaden our understanding of the acceptance of privacy trade-offs
V Distler, C Lallemand, V Koenig
Computers in Human Behavior, 106227, 2019
162019
A conceptual framework to study socio-technical security
A Ferreira, JL Huynen, V Koenig, G Lenzini
International Conference on Human Aspects of Information Security, Privacy …, 2014
162014
Driving while using a smartphone-based mobility application: Evaluating the impact of three multi-choice user interfaces on visual-manual distraction
N Louveton, R McCall, V Koenig, T Avanesov, T Engel
Applied Ergonomics 54, 196-204, 2016
142016
MaDSAV: maintaining driving skills in semi-autonomous vehicles
A Meschtscherjakov, R McCall, N Louveton, T Engel, M Tscheligi, ...
Adjunct Proceedings of the 7th International Conference on Automotive User …, 2015
112015
Towards a Simple City Driving Simulator Based on Speed Dreams and OSM
T Avanesov, N Louveton, R McCall, V Koenig, M Kracheel
Adjunct Proceedings of the 4th International Conference on Automotive User …, 2012
112012
Do graphical cues effectively inform users?
A Ferreira, JL Huynen, V Koenig, G Lenzini, S Rivas
International Conference on Human Aspects of Information Security, Privacy …, 2015
102015
Pervasive gaming as a potential solution to traffic congestion: new challenges regarding ethics, privacy and trust
V Koenig, F Boehm, R McCall
International Conference on Entertainment Computing, 586-593, 2012
92012
In Cyber-Space No One Can Hear You S· CREAM
A Ferreira, JL Huynen, V Koenig, G Lenzini
Security and Trust Management, 255-264, 2015
82015
The system can't perform the operation now. Try again later.
Articles 1–20