Author of the publication

A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks.

, , , , and . Entropy, 21 (8): 772 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving mobile operator information system efficiency through EAI., , , , and . Int. J. Inf. Technol. Manag., 3 (2/3/4): 315-332 (2004)XML schema metrics for quality evaluation., , , and . Comput. Sci. Inf. Syst., 11 (4): 1271-1289 (2014)Password security - No change in 35 years?, , and . MIPRO, page 1360-1365. IEEE, (2014)Improved standard FPA method--resolving problems with upper boundaries in the rating complexity process., , , and . J. Syst. Softw., 77 (2): 81-90 (2005)Quantitative Management of OO Development., , , , and . ICEIS, page 452-460. (1999)Differences between prospective, existing, and former users of interactive whiteboards on external factors affecting their adoption, usage and abandonment., , , and . Comput. Hum. Behav., (2017)Performance Assesment Framework for Distributed Object Architectures., , , , , , and . ADBIS, volume 1691 of Lecture Notes in Computer Science, page 349-366. Springer, (1999)A Preliminary Review of Blockchain-Based Solutions in Higher Education., , , and . LTEC, volume 1011 of Communications in Computer and Information Science, page 114-124. Springer, (2019)Using Object Oriented Software Metrics for Mobile Application Development., , and . SQAMIA, volume 1053 of CEUR Workshop Proceedings, page 17-27. CEUR-WS.org, (2013)Improving Mining of Medical Data by Outliers Prediction., , and . CBMS, page 91-96. IEEE Computer Society, (2005)