Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Action Research on Open Knowledge and Technology Transfer, , , , , , and . (2009)Advanced Information Modelling for Integrated Network Management Applications., , and . IEA/AIE, volume 604 of Lecture Notes in Computer Science, page 89-99. Springer, (1992)Discourses on information ethics: The claim to universality. Ethics and Information Technology, 10 (2): 97--108 (Sep 1, 2008)Philosophy and information systems: where are we and where should we go?, , and . Eur. J. Inf. Syst., 27 (3): 263-277 (2018)Privacy in the Human Brain Project: The Perspective of Ethics Management.. Privacy and Identity Management, volume 498 of IFIP Advances in Information and Communication Technology, page 52-55. (2016)Ethical and legal issues of the use of computational intelligence techniques in computer security and computer forensics., , , , and . IJCNN, page 1-8. IEEE, (2010)Does Ontology Influence Technological Projects? The Case of Irish Electronic Voting., and . Wissensmanagement (LNCS Volume), volume 3782 of Lecture Notes in Computer Science, page 657-667. Springer, (2005)Accountability and Reflective Responsibility in Information Systems.. The Information Society, volume 195 of IFIP, page 51-68. Springer, (2005)ETICA Workshop on Computer Ethics: Exploring Normative Issues., and . PrimeLife, volume 352 of IFIP Advances in Information and Communication Technology, page 64-77. Springer, (2010)Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law., , , , and . Computational Intelligence for Privacy and Security, volume 394 of Studies in Computational Intelligence, Springer, (2012)