Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What Makes Information System Developers Produce Defective Information Systems For Their Clients?, and . PACIS, page 107. (2012)Digital strategy patterns in information systems research., and . PACIS, page 83. (2019)Machine Learning for Prognosis of Oral Cancer: What Are the Ethical Challenges?, , and . Tethics, volume 2737 of CEUR Workshop Proceedings, page 1-22. CEUR-WS.org, (2020)State of the Art in Cybersecurity and Smart Grid Education., , , , , , , , and . EUROCON, page 571-576. IEEE, (2021)Patterns of Enterprise Architecture Adoption in the Public Sector: a Resource-based Perspective., , and . ECIS, (2019)Gray-Area Phenomenon In Information Systems Development: A Call For Research., , and . PACIS, page 198. Queensland University of Technology, (2011)Errors and Complications in SQL Query Formulation., , and . ACM Trans. Comput. Educ., 18 (3): 15:1-15:29 (2018)A Study of Computer Science Students' Ethical Attitudes and Its Implications to.. SIGCAS Comput. Soc., 33 (3): 3 (2003)How to Incorporate Accessibility to Design Principles for IS Artefacts?, and . EJC, volume 380 of Frontiers in Artificial Intelligence and Applications, page 167-178. IOS Press, (2023)Towards Establishing Principles for Designing Cybersecurity Simulations of Cyber-Physical Artefacts in Real-Time Simulation., , and . ISD, Universitat Politècnica de València / Association for Information Systems, (2021)