Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Addressing Legal Requirements in Requirements Engineering., and . RE, page 5-14. IEEE Computer Society, (2007)Aligning Requirements with HIPAA in the iTrust System., , and . RE, page 335-336. IEEE Computer Society, (2008)Evolving Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping Model., , , and . RE, page 94-101. IEEE Computer Society, (2001)Privacy Policy Representation in Web-based Healthcare., , and . AMCIS, page 323. Association for Information Systems, (2006)Examining Internet privacy policies within the context of user privacy values., , , and . IEEE Trans. Engineering Management, 52 (2): 227-237 (2005)Prioritizing Legal Requirements., , and . RELAW, page 27-32. IEEE Computer Society, (2009)Assessing identification of compliance requirements from privacy policies., , and . RELAW, page 52-61. IEEE Computer Society, (2012)A Prototype System for Transnational Information Sharing and Process Coordination., , , , , , , , , and 14 other author(s). DG.O, Digital Government Research Center, (2004)An Initial Exploration of the Relationship Between Pair Programming and Brooks' Law., , and . Agile Development Conference, page 11-20. IEEE Computer Society, (2004)Identifying vulnerabilities and critical requirements using criminal court proceedings., , , and . SAC, page 355-359. ACM, (2009)