From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Profiling with Big Data: Identifying Privacy Implication for Individuals, Groups and Society., и . MCIS, стр. 4. AISeL, (2018)Automated data-driven profiling: threats for group privacy., и . Inf. Comput. Secur., 28 (2): 183-197 (2020)Opportunities and Challenges for Reflective Data-Objects in Long-Distance Relationships., и . INTERACT (5), том 12936 из Lecture Notes in Computer Science, стр. 42-62. Springer, (2021)Electronic Voting Systems: Security Implications of the Administrative Workflow., , , , , и . DEXA Workshops, стр. 467-471. IEEE Computer Society, (2003)Employing Ontologies for the Development of Security Critical Applications., , , , , , и . I3E, том 189 из IFIP, стр. 187-201. Springer, (2005)Redefining Information Systems Security: Viable Information Systems., , и . SEC, том 193 из IFIP Conference Proceedings, стр. 453-468. Kluwer, (2001)Implementation Challenges for Information Security Awareness Initiatives in E-Government., , и . ECIS, стр. 179. (2012)Using the Lens of Circuits of Power in Information Systems Security Management., , и . TrustBus, том 4657 из Lecture Notes in Computer Science, стр. 228-236. Springer, (2007)Privacy and fair information practices in ubiquitous environments: Research challenges and future directions., , , и . Internet Res., 19 (2): 194-208 (2009)Formulating information systems risk management strategies through cultural theory., , , и . Inf. Manag. Comput. Secur., 14 (3): 198-217 (2006)