default search action
Joachim Meyer 0002
Person information
- affiliation: Tel Aviv University, Tel Aviv, Israel
Other persons with the same name
- Joachim Meyer — disambiguation page
- Joachim Meyer 0001 — Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany
- Joachim Meyer 0003 — Saarland University, Germany
- Joachim Meyer 0004 — SAP AG, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Yossef Saad, Joachim Meyer:
Quantifying Levels of Influence and Causal Responsibility in Dynamic Decision Making Events. ACM Trans. Intell. Syst. Technol. 15(1): 11:1-11:22 (2024) - [c34]Vera Schmitt, Luis-Felipe Villa-Arenas, Nils Feldhus, Joachim Meyer, Robert P. Spang, Sebastian Möller:
The Role of Explainability in Collaborative Human-AI Disinformation Detection. FAccT 2024: 2157-2174 - [c33]Vera Schmitt, Balázs Patrik Csomor, Joachim Meyer, Luis-Felipe Villa-Arenas, Charlott Jakob, Tim Polzehl, Sebastian Möller:
Evaluating Human-Centered AI Explanations: Introduction of an XAI Evaluation Framework for Fact-Checking. MAD@ICMR 2024: 91-100 - [i12]Joachim Meyer:
Doing AI: Algorithmic decision support as a human activity. CoRR abs/2402.14674 (2024) - 2023
- [j38]Yefim Shulman, Agnieszka Kitkowska, Joachim Meyer:
Informing Users: Effects of Notification Properties and User Characteristics on Sharing Attitudes. Int. J. Hum. Comput. Interact. 39(14): 2796-2824 (2023) - [c32]Tim Polzehl, Vera Schmitt, Nils Feldhus, Joachim Meyer, Sebastian Möller:
Fighting Disinformation: Overview of Recent AI-Based Collaborative Human-Computer Interaction for Intelligent Decision Support Systems. VISIGRAPP (2: HUCAPP) 2023: 267-278 - [e1]Felix Bieker, Joachim Meyer, Sebastian Pape, Ina Schiering, Andreas Weich:
Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30 - September 2, 2022, Proceedings. IFIP Advances in Information and Communication Technology 671, Springer 2023, ISBN 978-3-031-31970-9 [contents] - [i11]Nir Douer, Joachim Meyer:
Quantifying Retrospective Human Responsibility in Intelligent Systems. CoRR abs/2308.01752 (2023) - 2022
- [j37]Yefim Shulman, Joachim Meyer:
Degrees of Perceived Control Over Personal Information: Effects of Information Relevance and Levels of Processing. IEEE Access 10: 40596-40608 (2022) - [j36]Nir Douer, Joachim Meyer:
Judging One's Own or Another Person's Responsibility in Interactions With Automation. Hum. Factors 64(2): 359-371 (2022) - [i10]Ohad Inbar, Joachim Meyer:
Politeness Counts: Perceptions of Peacekeeping Robots. CoRR abs/2205.09549 (2022) - [i9]Salomon Eisler, Joachim Meyer:
Finding Patterns in Visualized Data by Adding Redundant Visual Information. CoRR abs/2205.13856 (2022) - [i8]Yefim Shulman, Agnieszka Kitkowska, Joachim Meyer:
Informing Users: Effects of Notification Properties and User Characteristics on Sharing Attitudes. CoRR abs/2207.02292 (2022) - 2021
- [j35]Nir Douer, Joachim Meyer:
Theoretical, Measured, and Subjective Responsibility in Aided Decision Making. ACM Trans. Interact. Intell. Syst. 11(1): 5:1-5:37 (2021) - [c31]Joachim Meyer, James K. Kuchar:
Maximal benefits and possible detrimental effects of binary decision aids. ICHMS 2021: 1-6 - 2020
- [j34]Joachim Meyer, Omer Dembinsky, Tal Raviv:
Alerting about possible risks vs. blocking risky choices: A quantitative model and its empirical evaluation. Comput. Secur. 97: 101944 (2020) - [j33]Nir Douer, Joachim Meyer:
The Responsibility Quantification Model of Human Interaction With Automation. IEEE Trans Autom. Sci. Eng. 17(2): 1044-1060 (2020) - [c30]Yoav Ben Yaakov, Joachim Meyer, Xinrun Wang, Bo An:
User detection of threats with different security measures. ICHMS 2020: 1-6 - [i7]Salomon Eisler, Joachim Meyer:
Visual Analytics and Human Involvement in Machine Learning. CoRR abs/2005.06057 (2020) - [i6]Yefim Shulman, Thao Ngo, Joachim Meyer:
Order of Control and Perceived Control over Personal Information. CoRR abs/2006.13898 (2020) - [i5]Joachim Meyer, James K. Kuchar:
Maximal benefits and possible detrimental effects of binary decision aids. CoRR abs/2010.00828 (2020)
2010 – 2019
- 2019
- [j32]Shiri Bar-Or, Joachim Meyer:
What Is Good Help? Responses to Solicited and Unsolicited Assistance. Int. J. Hum. Comput. Interact. 35(2): 131-139 (2019) - [j31]Ohad Inbar, Joachim Meyer:
Politeness Counts: Perceptions of Peacekeeping Robots. IEEE Trans. Hum. Mach. Syst. 49(3): 232-240 (2019) - [c29]Yoav Ben Yaakov, Xinrun Wang, Joachim Meyer, Bo An:
Choosing Protection: User Investments in Security Measures for Cyber Risk Management. GameSec 2019: 33-44 - [c28]Yefim Shulman, Thao Ngo, Joachim Meyer:
Order of Control and Perceived Control over Personal Information. Privacy and Identity Management 2019: 359-375 - [c27]Ohad Inbar, Joachim Meyer:
Presenting the Relevance of Suggested Information. SMC 2019: 3949-3955 - [i4]Yefim Shulman, Joachim Meyer:
Is Privacy Controllable? CoRR abs/1901.09804 (2019) - [i3]Nir Douer, Joachim Meyer:
Theoretical, Measured and Subjective Responsibility in Aided Decision Making. CoRR abs/1904.13086 (2019) - [i2]Nir Douer, Meirav Redlich, Joachim Meyer:
Objective and Subjective Responsibility of a Control-Room Worker. CoRR abs/1910.06566 (2019) - 2018
- [j30]Xiaowen Dong, Joachim Meyer, Erez Shmueli, Burçin Bozkaya, Alex Pentland:
Methods for quantifying effects of social unrest using credit card transaction data. EPJ Data Sci. 7(1): 8 (2018) - [j29]Noam Ben-Asher, Joachim Meyer:
The Triad of Risk-Related Behaviors (TriRB): A Three-Dimensional Model of Cyber Risk Taking. Hum. Factors 60(8): 1163-1178 (2018) - [c26]Yefim Shulman, Joachim Meyer:
Is Privacy Controllable? Privacy and Identity Management 2018: 222-238 - [i1]Nir Douer, Joachim Meyer:
The Responsibility Quantification (ResQu) Model of Human Interaction with Automation. CoRR abs/1810.12644 (2018) - 2017
- [j28]Joachim Meyer, Thomas B. Sheridan:
The Intricacies of User Adjustments of Alerting Thresholds. Hum. Factors 59(6): 901-910 (2017) - [c25]Agnieszka Kitkowska, Erik Wästlund, Joachim Meyer, Leonardo A. Martucci:
Is It Harmful? Re-examining Privacy Concerns. Privacy and Identity Management 2017: 59-75 - 2016
- [c24]Avraham Shvartzon, Amos Azaria, Sarit Kraus, Claudia V. Goldman, Joachim Meyer, Omer Tsimhoni:
Personalized Alert Agent for Optimal User Performance. AAAI 2016: 857-864 - 2015
- [j27]Michal Sela, Talia Lavie, Ohad Inbar, Ilit Oppenheim, Joachim Meyer:
Personalizing news content: An experimental study. J. Assoc. Inf. Sci. Technol. 66(1): 1-12 (2015) - [c23]Avraham Shvartzon, Amos Azaria, Sarit Kraus, Claudia V. Goldman, Omer Tsimhoni, Joachim Meyer:
A Game for Studying Maintenance Alerts' Effectiveness. AAMAS 2015: 1655-1656 - 2014
- [j26]Guillaume Doisy, Joachim Meyer, Yael Edan:
The Impact of Human-Robot Interface Design on the Use of a Learning Robot System. IEEE Trans. Hum. Mach. Syst. 44(6): 788-795 (2014) - [c22]Joachim Meyer:
Towards an Engineering Model of Privacy-Related Decisions. Privacy and Identity Management 2014: 17-25 - 2013
- [j25]Liat Antwarg, Talia Lavie, Lior Rokach, Bracha Shapira, Joachim Meyer:
Highlighting items as means of adaptive assistance. Behav. Inf. Technol. 32(8): 761-777 (2013) - [c21]Guillaume Doisy, Joachim Meyer:
Responses to Warnings and the Effect of Notifications in a Simulated Robot-Control Task. SMC 2013: 1594-1598 - 2012
- [j24]Nir Shahar, Joachim Meyer, Michael Hildebrandt, Vered Rafaely:
Detecting system failures from durations and binary cues. Int. J. Hum. Comput. Stud. 70(8): 552-560 (2012) - [c20]Roy Someshwar, Joachim Meyer, Yael Edan:
A Timing Control Model for H-R Synchronization. SyRoCo 2012: 698-703 - 2011
- [j23]Peter Bak, Joachim Meyer:
The effect of user characteristics on the efficiency of visual querying. Behav. Inf. Technol. 30(6): 809-819 (2011) - [j22]Sebastian Möller, Noam Ben-Asher, Klaus-Peter Engelbrecht, Roman Englert, Joachim Meyer:
Modeling the behavior of users who are confronted with security mechanisms. Comput. Secur. 30(4): 242-256 (2011) - [j21]Talia Lavie, Tal Oron-Gilad, Joachim Meyer:
Aesthetics and usability of in-vehicle navigation displays. Int. J. Hum. Comput. Stud. 69(1-2): 80-99 (2011) - [j20]Liron Nehmadi, Joachim Meyer, Yisrael Parmet, Noam Ben-Asher:
Predicting a screen area's perceived importance from spatial and physical attributes. J. Assoc. Inf. Sci. Technol. 62(9): 1829-1838 (2011) - [c19]Shiran Cohen, Noam Ben-Asher, Joachim Meyer:
Towards Information Technology Security for Universal Access. HCI (5) 2011: 443-451 - [c18]Verena Vanessa Hafner, Manja Lohse, Joachim Meyer, Yukie Nagai, Britta Wrede:
The role of expectations in intuitive human-robot interaction. HRI 2011: 7-8 - [c17]Noam Ben-Asher, Niklas Kirschnick, Hanul Sieger, Joachim Meyer, Asaf Ben-Oved, Sebastian Möller:
On the need for different security methods on mobile phones. Mobile HCI 2011: 465-473 - [c16]Guillaume Doisy, Joachim Meyer, Yael Edan:
Toward an Ecological Approach to Interface Design for Teaching Robots. TAROS 2011: 420-421 - 2010
- [j19]Talia Lavie, Michal Sela, Ilit Oppenheim, Ohad Inbar, Joachim Meyer:
User attitudes towards news content personalization. Int. J. Hum. Comput. Stud. 68(8): 483-495 (2010) - [j18]Talia Lavie, Joachim Meyer:
Benefits and costs of adaptive user interfaces. Int. J. Hum. Comput. Stud. 68(8): 508-524 (2010) - [c15]Geva Vashitz, Joachim Meyer, Yisrael Parmet, Niki Liebermann, Harel Gilutz:
Factors Affecting Physicians Compliance with Enrollment Suggestions into a Clinical Reminders Intervention. MedInfo 2010: 796-800
2000 – 2009
- 2009
- [j17]Talya Porat, Tal Oron-Gilad, Joachim Meyer:
Task-dependent processing of tables and graphs. Behav. Inf. Technol. 28(3): 293-307 (2009) - [j16]Bracha Shapira, Peretz Shoval, Noam Tractinsky, Joachim Meyer:
ePaper: A personalized mobile newspaper. J. Assoc. Inf. Sci. Technol. 60(11): 2333-2346 (2009) - [j15]Geva Vashitz, Joachim Meyer, Yisrael Parmet, Roni Peleg, Dan Goldfarb, Avi Porath, Harel Gilutz:
Defining and measuring physicians' responses to clinical reminders. J. Biomed. Informatics 42(2): 317-326 (2009) - [j14]Avital Bechar, Joachim Meyer, Yael Edan:
An Objective Function to Evaluate Performance of Human-Robot Collaboration in Target Recognition Tasks. IEEE Trans. Syst. Man Cybern. Part C 39(6): 611-620 (2009) - [c14]Noam Ben-Asher, Joachim Meyer, Sebastian Möller, Roman Englert:
An Experimental System for Studying the Tradeoff between Usability and Security. ARES 2009: 882-887 - [c13]Noam Ben-Asher, Joachim Meyer, Yisrael Parmet, Sebastian Möller, Roman Englert:
Security and usability research using a microworld environment. Mobile HCI 2009 - [c12]Ohad Inbar, Talia Lavie, Joachim Meyer:
Acceptable intrusiveness of online help in mobile devices. Mobile HCI 2009 - 2008
- [c11]Ohad Inbar, Noam Ben-Asher, Talya Porat, Dudu Mimran, Bracha Shapira, Peretz Shoval, Joachim Meyer, Noam Tractinsky:
All the news that's fit to e-ink. CHI Extended Abstracts 2008: 3621-3626 - [c10]Assaf Botzer, Joachim Meyer:
The effect of effort on responses to binary cues. ECCE 2008: 33 - 2007
- [c9]Geva Vashitz, Joachim Meyer, Harel Gilutz:
General Practitioners' Adherence with Clinical Reminders for Secondary Prevention of Dyslipidemia. AMIA 2007 - [c8]Ohad Inbar, Noam Tractinsky, Joachim Meyer:
Minimalism in information visualization: attitudes towards maximizing the data-ink ratio. ECCE 2007: 185-188 - [c7]Joachim Meyer:
Levels of automation in a binary categorization task. ECCE 2007: 233-236 - [c6]Avital Bechar, Joachim Meyer, Yael Edan:
An objective function to evaluate performance of human-robot systems for target recognition tasks. SMC 2007: 967-972 - 2006
- [j13]Tamar A. Ben-Bassat, Joachim Meyer, Noam Tractinsky:
Economic and subjective measures of the perceived value of aesthetics and usability. ACM Trans. Comput. Hum. Interact. 13(2): 210-234 (2006) - [c5]Avital Bechar, Yael Edan, Joachim Meyer:
Optimal Collaboration in Human-Robot Target Recognition Systems. SMC 2006: 4243-4248 - 2005
- [c4]Peter Bak, Joachim Meyer:
Effects of cognitive styles and data characteristics on visual data mining. Visualization and Data Analysis 2005: 77-86 - 2004
- [j12]Yuval Bitan, Joachim Meyer, David Shinar, Ehud Zmora:
Nurses' reactions to alarms in a neonatal intensive care unit. Cogn. Technol. Work. 6(4): 239-246 (2004) - [j11]Joachim Meyer:
Conceptual Issues in the Study of Dynamic Hazard Warnings. Hum. Factors 46(2): 196-204 (2004) - [c3]Tamar A. Ben-Bassat, Joachim Meyer, Noam Tractinsky:
Using monetary incentives and auctions to elicit user preferences between usability and aesthetics. CHI Extended Abstracts 2004: 1569 - [c2]Avital Bechar, Yael Edan, Joachim Meyer:
An objective function for performance measurement of human-robot target recognition systems in unstructured environments. SMC (1) 2004: 118-123 - 2003
- [c1]Joachim Meyer, L. Feinshreiber, Yisrael Parmet:
Levels of automation in a simulated failure detection task. SMC 2003: 2101-2106 - 2002
- [j10]Joachim Meyer, Yuval Bitan:
Why Better Operators Receive Worse Warnings. Hum. Factors 44(3): 343-353 (2002) - 2001
- [j9]Masha Maltz, Joachim Meyer:
Use of Warnings in an Attentionally Demanding Detection Task. Hum. Factors 43(2): 217-226 (2001) - [j8]Joachim Meyer:
Effects of Warning Validity and Proximity on Responses to Warnings. Hum. Factors 43(4): 563-572 (2001) - [j7]Noam Tractinsky, Joachim Meyer:
Task structure and the apparent duration of hierarchical search. Int. J. Hum. Comput. Stud. 55(5): 845-860 (2001) - 2000
- [j6]Ori Ben-Porat, Moshe Shoham, Joachim Meyer:
Control Design and Task Performance in Endoscopic Tele-Operation. Presence Teleoperators Virtual Environ. 9(3): 256-267 (2000)
1990 – 1999
- 1999
- [j5]Joachim Meyer, Marcia Kuskin Shamo, Daniel Gopher:
Information Structure and the Relative Efficacy of Tables and Graphs. Hum. Factors 41(4): 570-587 (1999) - [j4]Noam Tractinsky, Joachim Meyer:
Chartjunk or Goldgraph? Effects of Presentation Objectives and Content Desirability on Information Presentation. MIS Q. 23(3): 397-420 (1999) - 1997
- [j3]Joachim Meyer, David Shinar, David Leiser:
Multiple Factors that Determine Performance with Tables and Graphs. Hum. Factors 39(2): 268-286 (1997) - [j2]Joachim Meyer:
A New Look at an Old Study on Information Display: Washburne (1927) Reconsidered. Hum. Factors 39(3): 333-340 (1997) - 1995
- [j1]Joachim Meyer, Yuval Bitan, David Shinar:
Displaying a boundary in graphic and symbolic "wait" displays: Duration estimates and users' preferences. Int. J. Hum. Comput. Interact. 7(3): 273-290 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint