default search action
Helene Gelderblom
Person information
- affiliation: University of Pretoria, South Africa
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j8]Helene Gelderblom, Machdel Matthee, Marié Hattingh, Lizette Weilbach:
High school learners' continuance intention to use electronic textbooks: A usability study. Educ. Inf. Technol. 24(2): 1753-1776 (2019) - 2018
- [j7]Bester Chimbo, Helene Gelderblom:
TitanTutor: An educational technology solution co-designed by children from different age groups and socio-economic backgrounds. Int. J. Child Comput. Interact. 15: 13-23 (2018) - [j6]Hein Pieterse, Helene Gelderblom:
Guidelines for Error Message Design. Int. J. Technol. Hum. Interact. 14(1): 80-98 (2018) - [c16]Helene Gelderblom, Leanne Menge:
The invisible gorilla revisited: using eye tracking to investigate inattentional blindness in interface design. AVI 2018: 39:1-39:9 - 2017
- [j5]Helene Gelderblom, Funmi Adebesin, Jacques Brosens, Rendani Maarten Kruger:
Using Eye Tracking as a Tool to Teach Informatics Students the Importance of User Centered Design. Int. J. Inf. Commun. Technol. Educ. 13(4): 111-125 (2017) - [c15]Helene Gelderblom:
What Children Really Contribute When Participating in the Design of Web-Based Learning Applications. ICWL 2017: 185-195 - 2016
- [c14]Wynand Beukes, Helene Gelderblom, Alta van der Merwe:
Why designers responsible for websites of large organisations disregard basic web design principles. CONF-IRM 2016: 4 - [c13]Rendani Maarten Kruger, Helene Gelderblom, Wynand Beukes:
The value of comparative usability and UX evaluation for e-commerce organisations. CONF-IRM 2016: 9 - [c12]Andrew Cyrus Smith, Helene Gelderblom:
End-user programming with personally meaningful objects. PPIG 2016: 8 - [c11]Marthie A. Schoeman, Helene Gelderblom:
The Effect of Students' Educational Background and Use of a Program Visualization Tool in Introductory Programming. SAICSIT 2016: 37:1-37:10 - 2015
- [j4]Patricia Margaret Alexander, Helene Gelderblom, Estelle de Kock:
Contributions from Visitor Research to CI and ICT4D Theory and Research Methodology. J. Community Informatics 11(3) (2015) - 2014
- [j3]Tesfaye Bayu Bati, Helene Gelderblom, Judy van Biljon:
A blended learning approach for teaching computer programming: design for large classes in Sub-Saharan Africa. Comput. Sci. Educ. 24(1): 71-99 (2014) - [j2]Helene Gelderblom:
Giving children voice in the design of technology for education in the developing world. South Afr. Comput. J. 54: 34-42 (2014) - [c10]Tsele Rakubutu, Helene Gelderblom, Jason F. Cohen:
Participatory Design of Touch Gestures for Informational Search on a Tablet Device. SAICSIT 2014: 276 - [e1]Carina de Villiers, Alta van der Merwe, Jacobus Philippus van Deventer, M. C. Matthee, Helene Gelderblom, Aurona Gerber:
Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014, SAICSIT '14, Centurion, South Africa, September 29 - October 1, 2014. ACM 2014, ISBN 978-1-4503-3246-0 [contents] - 2013
- [c9]Jason C. Yip, Tamara L. Clegg, Elizabeth M. Bonsignore, Helene Gelderblom, Emily Rhodes, Allison Druin:
Brownies or bags-of-stuff?: domain expertise in cooperative inquiry with children. IDC 2013: 201-210 - 2012
- [c8]Tamara L. Clegg, Elizabeth M. Bonsignore, Jason C. Yip, Helene Gelderblom, Alex Kuhn, Tobin Valenstein, Becky Lewittes, Allison Druin:
Technology for promoting scientific practice and personal meaning in life-relevant learning. IDC 2012: 152-161 - [c7]Jason C. Yip, Tamara L. Clegg, Elizabeth Bonsignore, Helene Gelderblom, Becky Lewittes, Mona Leigh Guha, Allison Druin:
Kitchen Chemistry: Supporting Learners' Decisions in Science. ICLS 2012 - 2010
- [c6]Funmi Adebesin, Paula Kotzé, Helene Gelderblom:
The complementary role of two evaluation methods in the usability and accessibility evaluation of a non-standard system. SAICSIT 2010: 1-11 - [c5]Helene Gelderblom, Tobie van Dyk, Judy van Biljon:
Mobile phone adoption: do existing models adequately capture the actual usage of older adults? SAICSIT 2010: 67-74 - [c4]Marco Pretorius, Helene Gelderblom, Bester Chimbo:
Using eye tracking to compare how adults and children learn to use an unfamiliar computer game. SAICSIT 2010: 275-283
2000 – 2009
- 2009
- [c3]Helene Gelderblom, Paula Kotzé:
Ten design lessons from the literature on child development and children's use of technology. IDC 2009: 52-60 - 2008
- [c2]Helene Gelderblom, Paula Kotzé:
Designing technology for young children: what we can learn from theories of cognitive development. SAICSIT 2008: 66-75 - 2004
- [c1]Helene Gelderblom:
Designing software for young children: theoretically grounded guidelines. IDC 2004: 121-122 - 2000
- [j1]Helene Gelderblom:
OOPtutor: a CBL system for introductory object-oriented programming. ACM SIGCSE Bull. 32(2): 35-38 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint