Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incorporating Information Assurance in Systems Analysis and Design Curricula., , , and . AMCIS, page 238. Association for Information Systems, (2007)The Coming Age of Calm Technology, and . , page 75--85. New York, ACM, Copernicus Books (Springer), (May 1997)First softcover printing 1998.Changing a standard telecommunications laboratory to a same-time-different-place virtual laboratory format: techniques utilized and lessons learned., , and . IEEE Trans. Educ., 48 (4): 713-718 (2005)Whatever happened to the next-generation Internet?. Commun. ACM, 44 (9): 61-68 (2001)Foundation for the Study of Computer-Supported Collaborative Learning Requiring Immersive Presence., , , , , , and . J. Manag. Inf. Syst., 20 (4): 31-63 (2004)A Research Framework for Empirical Studies in Organizational Memory., and . HICSS (3), page 178-187. IEEE Computer Society, (1996)Coordinating Technologies for Knowledge Management in Virtual Organizations., , and . AIWoRC, page 21-26. IEEE Computer Society, (2000)Development of a National Repository of Digital Forensic Intelligence., , and . J. Digit. Forensics Secur. Law, 1 (2): 5-18 (2006)Enterprise Systems: Architecture, Implementation and Infrastructure Management Minitrack Introduction., and . HICSS, page 71. IEEE Computer Society, (2003)An Assessment of Elearning Technologies to Support Telecommunications Laboratory Learning Objectives., , , and . HICSS, IEEE Computer Society, (2004)