Ridgway, R. (2017).
Who’s Hacking Whom? I E. G. Coleman & C. M. Kelty (red.),
Limn: Hacks, Leaks, and Breaches (Bind 8, s. 120-126 ). University of California.
Sun, A., Londono, J. J., Elbaum, B., Estrada, L., Lazo, R. J., Vitale, L., Villasanti, H. G.
, Fusaroli, R., Perry, L. K. & Messinger, D. S. (2024).
Who Said What? An Automated Approach to Analyzing Speech in Preschool Classrooms.
Trecca, F., Bleses, D., Højen, A., Madsen, T. O.
& Christiansen, M. H. (2020).
When too many vowels impede language processing: An eye-tracking study of Danish-learning children.
Language and Speech,
63(4), 898-918.
https://doi.org/10.31234/osf.io/qhnyj,
https://doi.org/10.1177/0023830919893390
Zagermann, J., Pfeil, U., Rädle, R., Jetter, H.-C.
, Klokmose, C. N. & Reiterer, H. (2016).
When Tablets meet Tabletops: The Effect of Tabletop Size on Around-the-Table Collaboration with Personal Tablets. I
CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (s. 5470-5481). Association for Computing Machinery.
https://doi.org/10.1145/2858036.2858224
Sip, K. E., Carmel, D., Marchant, J. L.
, Li, J., Petrovic, P.
, Roepstorff, A., McGregor, W. B. & Frith, C. D. (2013).
When Pinocchio's nose does not grow: belief regarding lie-detectability modulates production of deception.
Frontiers in Human Neuroscience,
7, 1-11. Artikel 16.
https://doi.org/10.3389/fnhum.2013.00016