2008 |
12 | | Max M. North,
Jeremy Hill,
Ainonehi Aikhuele,
Sarah M. North:
Virtual Reality Technology Assisting Communication Apprehension.
CGVR 2008: 112-113 |
2007 |
11 | EE | Max M. North,
Roy George,
Sarah M. North:
A brief study of information security and ethics awareness as an imperative component of management information systems.
ACM Southeast Regional Conference 2007: 515-516 |
10 | | Sarah M. North,
Max M. North:
A Brief Study of Students' Attitudes, Curiosity, Interest, and Perceptions of Information and National Security.
Security and Management 2007: 255-259 |
2006 |
9 | EE | Max M. North,
Roy George,
Sarah M. North:
Computer security and ethics awareness in university environments: a challenge for management of information systems.
ACM Southeast Regional Conference 2006: 434-439 |
2004 |
8 | EE | Lynn D. McKinnon,
Max M. North:
A comparative study of presence in virtual reality vs. presence in the real world.
ACM Southeast Regional Conference 2004: 253-254 |
7 | | Sriprakash Sarathy,
Sarah M. North,
Roy George,
Max M. North:
Preparing for the Soldier for a Technological Battlefield.
MSV/AMCS 2004: 97-103 |
2003 |
6 | | Max M. North:
The Evolution of Virtual Reality Therapy.
CISST 2003: 305-311 |
1997 |
5 | | Dorothy Strickland,
Larry F. Hodges,
Max M. North,
Suzanne Weghorst:
Overcoming Phobias by Virtual Exposure.
Commun. ACM 40(8): 34-39 (1997) |
4 | | Max M. North,
Sarah M. North,
Joseph R. Coble:
Virtual Environment Psychotherapy: A Case Study of Fear of Flying Disorder.
Presence 6(1): 127-132 (1997) |
1996 |
3 | | Max M. North,
Sarah M. North,
Joseph R. Coble:
Effectiveness of Virtual Environment Desensitization in the Treatment of Agoraphobia.
Presence 5(3): 346-352 (1996) |
1995 |
2 | | Larry F. Hodges,
Rob Kooper,
Thomas C. Meyer,
Barbara O. Rothbaum,
Dan Opdyke,
Johannes J. de Graaff,
James S. Williford,
Max M. North:
Virtual Environments for Treating the Fear of Heights.
IEEE Computer 28(7): 27-34 (1995) |
1993 |
1 | | Max M. North,
Sarah M. North:
An Information Exploration and Visualization Approach for Direct Manipulation of Databases.
VCHCI 1993: 417-418 |