Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using lessons from health care to protect the privacy of library users: Guidelines for the de-identification of library data based on HIPAA., and . J. Assoc. Inf. Sci. Technol., 58 (8): 1198-1206 (2007)Reference Extract: Extending the Reach of Digital Reference through Collaborative Data Warehousing., and . Bull. IEEE Tech. Comm. Digit. Libr., (2005)Organizational Cultures of Libraries as a Strategic Resource., , , and . Libr. Trends, 53 (1): 33-53 (2004)Three Different Paths for Tabletop Gaming in School Libraries., , , and . Libr. Trends, 61 (4): 825-835 (2013)Raising reliability of web search tool research through replication and chaos theory.. JASIS, 51 (8): 724-729 (2000)Connections for game education and research in the iSchools.. iConference, page 725-727. ACM, (2011)A framework for Internet archeology: Discovering use patterns in digital library and Web-based information resources.. First Monday, (2005)Book reviews: Models for library management, decision-making, and planning.. J. Assoc. Inf. Sci. Technol., 54 (4): 359-360 (2003)The bibliomining process: Data warehousing and data mining for libraries. Sponsored by SIG LT., , , and . ASIST, volume 40 of Proc. Assoc. Inf. Sci. Technol., page 478-479. Wiley, (2003)How are libraries supporting gaming: A pilot exploration.. ASIST, volume 45 of Proc. Assoc. Inf. Sci. Technol., page 1-4. Wiley, (2008)