2004 |
12 | EE | Ken D. Eason,
Susan Harker,
Ann Apps,
Ross MacIntyre:
Towards an Integrated Digital Library: Exploration of User Responses to a 'Joined-Up' Service.
ECDL 2004: 452-463 |
11 | EE | Val Mitchell,
Susan Harker,
Ken D. Eason:
Mobility Mapping - A Discount Technique for Exploring User Needs for Future Mobile Products and Services.
Mobile HCI 2004: 476-480 |
1999 |
10 | EE | Susan Harker,
Ken D. Eason:
The Use of Scenarios for Organization Requirements Generation.
HICSS 1999 |
1998 |
9 | EE | K. F. Tan,
Mike Wing,
Norman Revell,
Gary Marsden,
C. Baldwin,
Ross MacIntyre,
Ann Apps,
Ken D. Eason,
S. Promfett:
Facts and Myths of Browsing and Searching in a Digital Library.
ECDL 1998: 669-670 |
1997 |
8 | | Andy Smith,
Lynne Dunckley,
Diana Burkhardt,
Alan Murkett,
Ken D. Eason,
Jonathan Church:
Development the optimum help system using the LUCID method.
INTERACT 1997: 307-314 |
7 | | Ken D. Eason,
Susan Harker:
Scenario Based Requirements Generation Tools for Organisational Design.
INTERACT 1997: 680-681 |
1995 |
6 | | Ken D. Eason,
Susan Harker,
R. F. Raven,
J. R. Brailsford,
A. D. Cross:
Expert or Assistant: Supporting Power Engineers in the Management of Electricity Distribution.
AI Soc. 9(1): 91-104 (1995) |
1991 |
5 | | Marilyn M. Mantei,
Thomas T. Hewett,
Ken D. Eason,
Jennifer Preece:
Report on the INTERACT'90 Workshop on Education in HCI: Transcending Disciplinary and National Boundaries.
Interacting with Computers 3(2): 232-240 (1991) |
1990 |
4 | | Susan Harker,
C. Wendy Olphert,
Ken D. Eason:
The development of tools to assist in organisational requirements definition for information technology systems.
INTERACT 1990: 295-300 |
1988 |
3 | | Ken D. Eason,
Susan Harker:
The Supplier's Role in the Design of Products for Organisations.
Comput. J. 31(5): 426-430 (1988) |
1987 |
2 | | Ken D. Eason,
C. Wendy Olphert,
F. Novara,
N. Bertaggia,
N. Allamanno:
The Design of Usable IT Products: The ESPRIT/HUFIT Approach.
HCI (2) 1987: 147-154 |
1976 |
1 | | Ken D. Eason:
Understanding the Naive Computer User.
Comput. J. 19(1): 3-7 (1976) |