default search action
Debora Jeske
Person information
- affiliation: Northumbria University, Newcastle Upon Tyne, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c13]Debora Jeske:
Virtual Internships as Employer-Led Initiatives: Success Criteria and Reflections on the Diversification of Internships. I3E 2022: 167-179 - [c12]Ali Farooq, Debora Jeske, Paul van Schaik, Michael Moran:
Voice Assistants: (Physical) Device Use Perceptions, Acceptance, and Privacy Concerns. I3E 2022: 485-498 - 2021
- [j17]Johannes Werner, Debora Jeske:
Ten simple rules for running and managing virtual internships. PLoS Comput. Biol. 17(2) (2021)
2010 – 2019
- 2019
- [c11]Ali Farooq, Debora Jeske, Jouni Isoaho:
Predicting Students' Security Behavior Using Information-Motivation-Behavioral Skills Model. SEC 2019: 238-252 - 2018
- [j16]Ådne Stenberg Vik, Bjørn Christian Nørbech, Debora Jeske:
Virtual Career Fairs: Perspectives from Norwegian Recruiters and Exhibitors. Future Internet 10(2): 19 (2018) - [j15]Thomas Stephen Calvard, Debora Jeske:
Developing human resource data risk management in the age of big data. Int. J. Inf. Manag. 43: 159-164 (2018) - 2017
- [j14]Georg J. P. Link, Kevin Lumbard, Kieran Conboy, Michael Feldman, Joseph Feller, Jordana J. George, Matt Germonprez, Sean P. Goggins, Debora Jeske, Gaye Kiely, Kristen Schuster, Matt Willis:
Contemporary Issues of Open Data in Information Systems Research: Considerations and Recommendations. Commun. Assoc. Inf. Syst. 41: 25 (2017) - [j13]Paul van Schaik, Debora Jeske, Joseph A. Onibokun, Lynne M. Coventry, Jurjen Jansen, Petko Kusev:
Risk perceptions of cyber-security and precautionary behaviour. Comput. Hum. Behav. 75: 547-559 (2017) - [j12]Debora Jeske, Paul van Schaik:
Familiarity with Internet threats: Beyond awareness. Comput. Secur. 66: 129-141 (2017) - [j11]Joy Backhaus, Debora Jeske, Herbert Poinstingl, Sarah Koenig:
Assessing Efficiency of Prompts Based on Learner Characteristics. Comput. 6(1): 7 (2017) - [j10]Debora Jeske, Andrew R. McNeill, Lynne M. Coventry, Pam Briggs:
Security information sharing via Twitter: 'Heartbleed' as a case study. Int. J. Web Based Communities 13(2): 172-192 (2017) - [c10]Debora Jeske, Mammed Bagher, Nadia Pantidi:
HCI expertise needed! Personalisation and feedback optimisation in online education. BCS HCI 2017 - [c9]George J. D. Sweeten, Debora Jeske, Ruoyun Lin:
Narcissism: A factor behind the selective sharing of news online. BCS HCI 2017 - [c8]Pam Briggs, Debora Jeske, Lynne M. Coventry:
The Design of Messages to Improve Cybersecurity Incident Reporting. HCI (22) 2017: 3-13 - [c7]Georg J. P. Link, Debora Jeske:
Understanding Organization and Open Source Community Relations through the Attraction-Selection-Attrition Model. OpenSym 2017: 17:1-17:8 - [c6]Debora Jeske, Mammed Bagher, Nadia Pantidi:
Current and Alternate Approaches to Personalization in Online Learning. OpenSym 2017: 20:1-20:4 - 2016
- [j9]Justine A. Walker, Debora Jeske:
Understanding Bystanders' Willingness to Intervene in Traditional and Cyberbullying Scenarios. Int. J. Cyber Behav. Psychol. Learn. 6(2): 22-38 (2016) - [j8]Samantha Stinson, Debora Jeske:
Exploring Online Dating in Line with the "Social Compensation" and "Rich-Get-Richer" Hypotheses. Int. J. Cyber Behav. Psychol. Learn. 6(4): 75-87 (2016) - [j7]Ruoyun Lin, Debora Jeske:
Impression management via content-dependent 'liking' on social media. Int. J. Web Based Communities 12(4): 342-359 (2016) - [j6]Debora Jeske, Pam Briggs, Lynne M. Coventry:
Exploring the relationship between impulsivity and decision-making on mobile devices. Pers. Ubiquitous Comput. 20(4): 545-557 (2016) - [c5]Lyndsey Jenkins, Ruoyun Lin, Debora Jeske:
Influences and Benefits of Role Models on Social Media. I3E 2016: 673-684 - 2015
- [j5]Sophie E. Tait, Debora Jeske:
Hello Stranger!: Trust and Self-Disclosure Effects on Online Information Sharing. Int. J. Cyber Behav. Psychol. Learn. 5(1): 42-55 (2015) - [j4]Amy E. Baker, Debora Jeske:
Assertiveness and Anxiety Effects in Traditional and Online Interactions. Int. J. Cyber Behav. Psychol. Learn. 5(3): 30-46 (2015) - [c4]James Turland, Lynne M. Coventry, Debora Jeske, Pam Briggs, Aad P. A. van Moorsel:
Nudging towards security: developing an application for wireless network selection for android phones. BCS HCI 2015: 193-201 - 2014
- [j3]Jessica Maddison, Debora Jeske:
Fear and Perceived Likelihood of Victimization in Traditional and Cyber Settings. Int. J. Cyber Behav. Psychol. Learn. 4(4): 23-40 (2014) - [j2]Debora Jeske, Carolyn M. Axtell:
e-Internships: prevalence, characteristics and role of student perspectives. Internet Res. 24(4): 457-473 (2014) - [j1]Debora Jeske, Joy Backhaus, Christian Stamov-Roßnagel:
Self-regulation during e-learning: using behavioural evidence from navigation log files. J. Comput. Assist. Learn. 30(3): 272-284 (2014) - [c3]Lynne M. Coventry, Pam Briggs, Debora Jeske, Aad P. A. van Moorsel:
SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment. HCI (8) 2014: 229-239 - [c2]Arne Hendrik Schulz, Debora Jeske:
Learner Differences in the Online Context: Introducing a New Method. KCICTP/ITEM 2014: 306-317 - [c1]Debora Jeske, Lynne M. Coventry, Pamela Briggs:
Decision Justifications for Wireless Network Selection. STAST 2014: 1-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint