Author of the publication

Discovering Identity Problems: A Case Study.

, , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 368-373. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Concept Classification of Text from Electronic Meetings, , , , and . Commun. ACM, 37 (10): 56--73 (1994)Mapping Dark Web Geolocation., and . EuroISI, volume 5376 of Lecture Notes in Computer Science, page 97-107. Springer, (2008)Homeland Security Data Mining Using Social Network Analysis.. EuroISI, volume 5376 of Lecture Notes in Computer Science, page 4. Springer, (2008)An integrated approach to mapping worldwide bioterrorism research capabilities., , , , and . ISI, page 212-214. IEEE, (2008)Senior Scholars' Forum., , , , , and . ICIS, Association for Information Systems, (2011)User acceptance of Intelligence and Security Informatics technology: A study of COPLINK., , and . J. Assoc. Inf. Sci. Technol., 56 (3): 235-244 (2005)Introduction to the special topic issue: Intelligence and security informatics.. J. Assoc. Inf. Sci. Technol., 56 (3): 217-220 (2005)Document clustering for electronic meetings: an experimental comparison of two techniques., and . Decis. Support Syst., 27 (1-2): 67-79 (1999)Research note: Examining gender emotional differences in Web forum communication., , and . Decis. Support Syst., 55 (3): 851-860 (2013)Organizing domain-specific information on the Web: An experiment on the Spanish business Web directory., , , , and . Int. J. Hum. Comput. Stud., 66 (2): 51-66 (2008)