Author of the publication

Panel: Developing An Ethical Agenda for A Networked Workplace.

, , , , and . ECIS, page 1535-1536. Cork Publishing Ltd, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semiotic Analysis of Knowledge Intensive Business Processes: Developing Interpretations for Sustainable Competitive Advantage., and . AMCIS, page 389. Association for Information Systems, (2005)A Semantic Analysis of Security Policy Formulation and Implementation: A Case Study., and . AMCIS, page 166. Association for Information Systems, (2006)Using Actor Network Theory to Understand Information Security Management., , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 43-54. Springer, (2010)When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems., , , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 352-363. Springer, (2012)Panel: Information systems security standards: The solution or the problem?, , , and . ECIS, page 1780-1782. (2005)Atrial Fibrillation Stratification Via Super-Resolution Analysis of Fibrillatory Waves., , , , , , and . CinC, page 1-4. IEEE, (2019)A Holistic Approach for Enriching Information Security Analysis and Security Policy Formation., and . ECIS, page 146. (2010)Value-Focused Assessment of Information System Security in Organizations., and . ICIS, page 561-566. Association for Information Systems, (2001)Developing Integrated Solutions in the Health Care Environment: A Case Study., and . ECIS, page 1163-1172. (1996)Developing A Networked Authority: Nature and Significance of Power Relationships., , and . ECIS, page 511-525. Cork Publishing Ltd, (1997)