default search action
Trevor Barker
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j7]Abrar Ullah, Hannan Xiao, Trevor Barker:
A study into the usability and security implications of text and image based challenge questions in the context of online examination. Educ. Inf. Technol. 24(1): 13-39 (2019) - [j6]Abrar Ullah, Hannan Xiao, Trevor Barker:
A Dynamic Profile Questions Approach to Mitigate Impersonation in Online Examinations. J. Grid Comput. 17(2): 209-223 (2019) - 2018
- [c26]Abrar Ullah, Hannan Xiao, Trevor Barker:
A Multi-factor Authentication Method for Security of Online Examinations. SGIoT 2018: 131-138 - 2017
- [c25]Ger Joyce, Mariana Lilley, Trevor Barker, Amanda Jefferies:
From Healthcare to Human-Computer Interaction: Using Framework Analysis Within Qualitative Inquiry. AHFE (23) 2017: 93-100 - [c24]Ger Joyce, Mariana Lilley, Trevor Barker, Amanda Jefferies:
Mobile Application Usability Heuristics: Decoupling Context-of-Use. HCI (18) 2017: 410-423 - 2016
- [j5]Stella Lee, Trevor Barker, Vivekanandan Suresh Kumar:
Effectiveness of a Learner-Directed Model for e-Learning. J. Educ. Technol. Soc. 19(3): 221-233 (2016) - [c23]Ger Joyce, Mariana Lilley, Trevor Barker, Amanda Jefferies:
Mobile Application Tutorials: Perception of Usefulness from an HCI Expert Perspective. HCI (2) 2016: 302-308 - 2015
- [c22]Abrar Ullah, Hannan Xiao, Trevor Barker:
Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication. HCI (22) 2015: 131-140 - [c21]Ger Joyce, Mariana Lilley, Trevor Barker, Amanda Jefferies:
Smartphone Application Usability Evaluation: The Applicability of Traditional Heuristics. HCI (19) 2015: 541-550 - 2014
- [j4]Abrar Ullah, Hannan Xiao, Trevor Barker, Mariana Lilley:
Evaluating security and usability of profile based challenge questions authentication in online examinations. J. Internet Serv. Appl. 5(1): 2:1-2:16 (2014) - [c20]Abrar Ullah, Hannan Xiao, Mariana Lilley, Trevor Barker:
Privacy and usability of image and text based challenge questions authentication in online examination. ICETC 2014: 24-29 - [c19]Abrar Ullah, Hannan Xiao, Trevor Barker, Mariana Lilley:
Graphical and text based challenge questions for secure and usable authentication in online examinations. ICITST 2014: 302-308 - [c18]Ger Joyce, Mariana Lilley, Trevor Barker, Amanda Jefferies:
Adapting Heuristics for the Mobile Panorama. Interacción 2014: 72:1-72:2 - 2012
- [c17]Abrar Ullah, Hannan Xiao, Mariana Lilley, Trevor Barker:
Usability of profile based student authentication and traffic light system in online examinations. ICITST 2012: 220-225 - 2011
- [c16]Stella Lee, Trevor Barker, Vive Kumar:
Learning Preferences and Self-Regulation - Design of a Learner-Directed E-Learning Model. FGIT-ASEA/DRBC/EL 2011: 579-589 - 2010
- [j3]Trevor Barker:
An Automated Feedback System Based on Adaptive Testing: Extending the Model. Int. J. Emerg. Technol. Learn. 5(1): 11-14 (2010)
2000 – 2009
- 2008
- [c15]Nan Ma, Tracy Hall, Trevor Barker:
Building a Narrative Based Requirements Engineering Mediation Model. EuroSPI 2008: 1-12 - [c14]Nan Ma, Tracy Hall, Trevor Barker, Ming Zhang:
Using Mediation Theory to Build a Requirements Conflict Resolution Model. WER 2008 - 2007
- [c13]Asli Adisen, Trevor Barker, Carol Britton:
Improving the user experience of complex applications: adapting to the user's mental model. ECCE 2007: 215-218 - 2005
- [c12]Mariana Lilley, Trevor Barker, Carol Britton:
The Generation of Automated Learner Feedback Based on Individual Proficiency Levels. IEA/AIE 2005: 842-844 - [c11]Mariana Lilley, Trevor Barker, Carol Britton:
Learners' Perceived Level of Difficulty of a Computer-Adaptive Test: A Case Study. INTERACT 2005: 1026-1029 - [c10]Jennifer Swan, Trevor Barker, Carol Britton, Maria Kutar:
An empirical study of factors that affect user performance when using UML interaction diagrams. ISESE 2005: 346-355 - 2004
- [j2]Mariana Lilley, Trevor Barker, Carol Britton:
The development and evaluation of a software prototype for computer-adaptive testing. Comput. Educ. 43(1-2): 109-123 (2004) - [c9]Mariana Lilley, Trevor Barker:
A Computer-Adaptive Test That Facilitates the Modification of Previously Entered Responses: An Empirical Study. Intelligent Tutoring Systems 2004: 22-33 - [c8]Guy Saward, Tracy Hall, Trevor Barker:
Assessing Usability through Perceptions of Information Scent. IEEE METRICS 2004: 337-346 - [c7]Jennifer Swan, Maria Kutar, Trevor Barker, Carol Britton:
User Preference and Performance with UML Interaction Diagrams. VL/HCC 2004: 243-250 - 2003
- [c6]Maria Kutar, Carol Britton, Trevor Barker, Jennifer Swan:
Investigating the influence of structure of user performance with UML interaction diagrams. PPIG 2003: 18 - 2002
- [j1]Trevor Barker, Sara Jones, Carol Britton, David Messer:
The Use of a Co-operative Student Model of Learner Characteristics to Configure a Multimedia Application. User Model. User Adapt. Interact. 12(2-3): 207-241 (2002) - [c5]Maria Kutar, Carol Britton, Trevor Barker:
A Comparison of Empirical Study and Cognitive Dimensions Analysis in the Evaluation of UML Diagrams. PPIG 2002: 1 - [c4]Carol Britton, Maria Kutar, Sue Anthony, Trevor Barker, Sarah Beecham, Vitoria Wilkinson:
An Empirical Study of User Preference and Performance with UML Diagrams. HCC 2002: 31-33 - [c3]Eyal Haik, Trevor Barker, John Sapsford, Simon A. Trainis:
Investigation into effective navigation in desktop virtual interfaces. Web3D 2002: 59-66 - 2001
- [c2]Trevor Barker, Janet Barker:
How Group Working Was Used to Provide a Constructive Computer-Based Learning Environment. Cognitive Technology 2001: 203-213
1990 – 1999
- 1999
- [c1]Trevor Barker, Sara Jones, Carol Britton, David Messer:
Investigation into the Effect of Language on Performance in a Multimedia Food Studies Application. INTERACT 1999: 648-653
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint