Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building Real Computer Systems., , , , and . IEEE Micro, 20 (3): 48-56 (2000)A unifying logic-based formalism for semantic data models., and . ACM Conference on Computer Science, page 342-348. ACM, (1991)Facebook as a Learning Tool in Formal Learning Process., and . HCI (28), volume 529 of Communications in Computer and Information Science, page 212-217. Springer, (2015)Preparing for Cyber Crisis Management Exercises., and . HCI (17), volume 12197 of Lecture Notes in Computer Science, page 279-290. Springer, (2020)HIP - A Technology-Rich and Interactive Multimedia Pedagogical Platform., and . HCI (14), volume 8523 of Lecture Notes in Computer Science, page 151-160. Springer, (2014)A Socio-Technical Regime Transitions Model for Gerontechnology Service Design: Privacy, Information Security and Cyber Security in Focus., and . pHealth, volume 299 of Studies in Health Technology and Informatics, page 20-29. IOS Press, (2022)Towards a Maturity Improvement Process - Systemically Closing the Socio-Technical Gap., , and . STPIS, volume 2789 of CEUR Workshop Proceedings, page 195-205. CEUR-WS.org, (2020)Deriving Cyber Security Risks from Human and Organizational Factors - A Socio-technical Approach., and . Complex Syst. Informatics Model. Q., (2019)From Cyber Incidents to Training Cognitive Situation Management: *Work in Progress., , , and . CogSIMA, page 163-166. IEEE, (2020)Leśniewski's ontology extended with the axiom of choice.. Notre Dame J. Formal Log., 18 (1): 1-78 (1977)