Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Trust in a Public Key Certification Authority., and . Comput. Secur., 20 (7): 592-611 (2001)Down-to-Earth Issues in Information System Use., and . PACIS, page 191. (2013)Automated Decomposition of Access Control Policies., , , and . POLICY, page 3-13. IEEE Computer Society, (2005)On Appealing to Philosophy in Information Systems.. AMCIS, page 518. Association for Information Systems, (2004)What is a diagram?, and . IV, page 951-956. IEEE Computer Society, (2007)Guidelines for a 'Proximal' User Interface.. TFWWG, page 339-355. Springer, (2000)A Philosophical Underpinning For ISD.. ECIS, page 68-78. (2002)New research directions for data and knowledge engineering: A philosophy of language approach, and . Data & Knowledge Engineering, 67 (2): 260--285 (2008)Special Jubilee Issue: DKE 25 Years.The notion of lifeworld applied to information systems research.. ECIS, page 2995-3006. (2009)Design of a user interface for a knowledge refinement tool., , , and . Int. J. Hum. Comput. Stud., 45 (2): 157-183 (1996)