Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing Internet E-Commerce Benchmarks., , and . Inf. Syst., 24 (6): 475-493 (1999)WebEC: A Benchmark for the Cybermediary Business Model in E-Commerce., , and . IMSA, page 388-392. IASTED/ACTA Press, (1999)PAUSE: A privacy architecture for heterogeneous big data environments., and . IEEE BigData, page 1919-1928. IEEE Computer Society, (2015)Multi-view Memory To Support OS Locking for Transaction Systems., and . IDEAS, page 45-52. IEEE Computer Society, (1997)A Churn-Strategy Alignment Model for Managers in Mobile Telecom., , and . CNSR, page 48-53. IEEE Computer Society, (2005)A Methodology for Creating E-Business Strategy., , and . HICSS, IEEE Computer Society, (2001)Supporting CLEAR: A Strategy for Small and Medium Size Enterprise Adoption of e-Business Practices in Atlantic Canada., and . E-Business: Multidisciplinary Research and Practice, volume 252 of IFIP Conference Proceedings, page 169-186. Kluwer, (2002)Management of Users' Privacy Preferences in Context., , and . IRI, page 91-97. IEEE Systems, Man, and Cybernetics Society, (2007)A Client-Side Business Model for Electronic Privacy., and . Bled eConference, page 1. (2003)Multi-View Access Control Memory Computer System., and . ACM Conference on Computer Science, page 241-248. ACM, (1994)