{"language":[{"iso":"eng"}],"_id":"24078","user_id":"405","status":"public","publication":"Sicherheitskritische Mensch-Computer-Interaktion","type":"book_chapter","title":"Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion","doi":"10.1007/978-3-658-32795-8_31","date_updated":"2022-01-06T06:56:06Z","author":[{"full_name":"Reuter, Christian","last_name":"Reuter","first_name":"Christian"},{"first_name":"Konstantin","last_name":"Aal","full_name":"Aal, Konstantin"},{"first_name":"Frank","last_name":"Beham","full_name":"Beham, Frank"},{"first_name":"Alexander","full_name":"Boden, Alexander","last_name":"Boden"},{"last_name":"Brauner","full_name":"Brauner, Florian","first_name":"Florian"},{"first_name":"Frank","last_name":"Fiedrich","full_name":"Fiedrich, Frank"},{"first_name":"Frank","last_name":"Fuchs-Kittowski","full_name":"Fuchs-Kittowski, Frank"},{"first_name":"Stefan","full_name":"Geisler, Stefan","last_name":"Geisler"},{"first_name":"Klaus","full_name":"Gennen, Klaus","last_name":"Gennen"},{"full_name":"Herrmann, Dominik","last_name":"Herrmann","first_name":"Dominik"},{"first_name":"Marc-André","last_name":"Kaufhold","full_name":"Kaufhold, Marc-André"},{"full_name":"Klafft, Michael","last_name":"Klafft","first_name":"Michael"},{"last_name":"Lipprandt","full_name":"Lipprandt, Myriam","first_name":"Myriam"},{"full_name":"Lo Iacono, Luigi","last_name":"Lo Iacono","first_name":"Luigi"},{"first_name":"Thomas","last_name":"Ludwig","full_name":"Ludwig, Thomas"},{"first_name":"Stephan","last_name":"Lukosch","full_name":"Lukosch, Stephan"},{"full_name":"Mentler, Tilo","last_name":"Mentler","first_name":"Tilo"},{"first_name":"Simon","full_name":"Nestler, Simon","last_name":"Nestler"},{"first_name":"Volkmar","last_name":"Pipek","full_name":"Pipek, Volkmar"},{"last_name":"Pottebaum","full_name":"Pottebaum, Jens","first_name":"Jens"},{"first_name":"Sven","full_name":"Quadflieg, Sven","last_name":"Quadflieg"},{"full_name":"Rusch, Gebhard","last_name":"Rusch","first_name":"Gebhard"},{"full_name":"Sackmann, Stefan","last_name":"Sackmann","first_name":"Stefan"},{"last_name":"Stieglitz","full_name":"Stieglitz, Stefan","first_name":"Stefan"},{"full_name":"Sturm, Christian","last_name":"Sturm","first_name":"Christian"},{"full_name":"Volkamer, Melanie","last_name":"Volkamer","first_name":"Melanie"},{"first_name":"Volker","last_name":"Wulf","full_name":"Wulf, Volker"}],"date_created":"2021-09-09T13:03:38Z","place":"Wiesbaden","year":"2021","citation":{"chicago":"Reuter, Christian, Konstantin Aal, Frank Beham, Alexander Boden, Florian Brauner, Frank Fiedrich, Frank Fuchs-Kittowski, et al. “Die Zukunft Sicherheitskritischer Mensch-Computer-Interaktion.” In Sicherheitskritische Mensch-Computer-Interaktion. Wiesbaden, 2021. https://doi.org/10.1007/978-3-658-32795-8_31.","ieee":"C. Reuter et al., “Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion,” in Sicherheitskritische Mensch-Computer-Interaktion, Wiesbaden, 2021.","ama":"Reuter C, Aal K, Beham F, et al. Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion. In: Sicherheitskritische Mensch-Computer-Interaktion. ; 2021. doi:10.1007/978-3-658-32795-8_31","apa":"Reuter, C., Aal, K., Beham, F., Boden, A., Brauner, F., Fiedrich, F., Fuchs-Kittowski, F., Geisler, S., Gennen, K., Herrmann, D., Kaufhold, M.-A., Klafft, M., Lipprandt, M., Lo Iacono, L., Ludwig, T., Lukosch, S., Mentler, T., Nestler, S., Pipek, V., … Wulf, V. (2021). Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion. In Sicherheitskritische Mensch-Computer-Interaktion. https://doi.org/10.1007/978-3-658-32795-8_31","short":"C. Reuter, K. Aal, F. Beham, A. Boden, F. Brauner, F. Fiedrich, F. Fuchs-Kittowski, S. Geisler, K. Gennen, D. Herrmann, M.-A. Kaufhold, M. Klafft, M. Lipprandt, L. Lo Iacono, T. Ludwig, S. Lukosch, T. Mentler, S. Nestler, V. Pipek, J. Pottebaum, S. Quadflieg, G. Rusch, S. Sackmann, S. Stieglitz, C. Sturm, M. Volkamer, V. Wulf, in: Sicherheitskritische Mensch-Computer-Interaktion, Wiesbaden, 2021.","mla":"Reuter, Christian, et al. “Die Zukunft Sicherheitskritischer Mensch-Computer-Interaktion.” Sicherheitskritische Mensch-Computer-Interaktion, 2021, doi:10.1007/978-3-658-32795-8_31.","bibtex":"@inbook{Reuter_Aal_Beham_Boden_Brauner_Fiedrich_Fuchs-Kittowski_Geisler_Gennen_Herrmann_et al._2021, place={Wiesbaden}, title={Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion}, DOI={10.1007/978-3-658-32795-8_31}, booktitle={Sicherheitskritische Mensch-Computer-Interaktion}, author={Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and et al.}, year={2021} }"},"publication_status":"published"}