Author of the publication

Understanding Nuances of Privacy and Security in the Context of Information Systems.

, , and . AMCIS, Association for Information Systems, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biological Models of Security for Virus Propagation in Computer Networks., and . login Usenix Mag., (2004)Model for Trust Among Peers in Electronic Multiparty Transactions., and . AMCIS, page 227. Association for Information Systems, (2003)Multimedia Systems for Art and Culture: A Case Study of Brihadisvara Temple., , , , , and . Storage and Retrieval for Image and Video Databases (SPIE), volume 3022 of SPIE Proceedings, page 249-261. SPIE, (1997)Self-Organization in Traffic Lights: Evolution of Signal Control with Advances in Sensors and Communications., , and . CoRR, (2017)Deepfake Audio Detection., , , , and . AMCIS, Association for Information Systems, (2022)Can financial incentives help with the struggle for security policy compliance?, , , and . Inf. Manag., 58 (4): 103447 (2021)An Active Model-Based Prototype for Predictive Network Management, and . IEEE Journal on Selected Areas in Communications Journal, 23 (10): 2040-2057 (November 2005)Collaborative teaching in large classes of computer science courses., , , , , , , , and . IC3, page 397-403. IEEE Computer Society, (2015)Are External Auditors Capable of Dealing with Cybersecurity Risks?, , and . ICDF2C, volume 508 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 326-340. Springer, (2022)Infusing Software Quality Concepts in Computer Science Engineering Courses., and . IC3, page 1-7. IEEE, (2019)