Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RDM Roadmap@Edinburgh - An Institutional Approach., and . IASSIST Conference, IASSIST, (2013)IASSIST Latin Engagement Strategic Action Group., and . IASSIST Conference, IASSIST, (2011)Data requirements and Digital Repositories., , , , , and . IASSIST Conference, IASSIST, (2009)Crowdsourcing the Past with Addressing History.. IASSIST Conference, IASSIST, (2012)Libraries in the Converging Worlds of Open Data, E-Research, and Web 2.0., and . Online, 32 (2): 36--40 (March 2008)User Engagement in Research Data Curation., and . ECDL, volume 5714 of Lecture Notes in Computer Science, page 309-314. Springer, (2009)Marketing public sector information: Some issues., , and . Comput. Law Secur. Rev., 10 (5): 234-237 (1994)Looking for data directions? Ask a data librarian., and . IASSIST Conference, IASSIST, (2005)Assessing and Responding to the Cyberterrorism Threat.. Terrorist Use of Cyberspace and Cyber Terrorism, volume 42 of NATO Science for Peace and Security Series, D: Information and Communication Security, IOS Press, (2015)Tradition in Transition: Technological Change and Employment In Australian Trading Banks., and . Aust. Comput. J., 15 (4): 128-137 (1983)