Author of the publication

Meeting privacy obligations: the implications for information systems development.

, , and . ECIS, page 1035-1050. (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DQ Tags and Decision-Making., and . HICSS, page 1-10. IEEE Computer Society, (2010)Cybersecurity Risk Management Using Analytics: A Dynamic Capabilities Approach., , , and . ICIS, Association for Information Systems, (2018)Embedding Business Intelligence Systems within Organisations., , , and . DSS, volume 238 of Frontiers in Artificial Intelligence and Applications, page 113-124. IOS Press, (2012)Organizational Security Learning from Incident Response., , , , and . ICIS, Association for Information Systems, (2017)A case analysis of information systems and security incident responses., , and . Int. J. Inf. Manag., 35 (6): 717-723 (2015)The Role of Organizational Motivations in Information Systems Implementation., , and . PACIS, page 192. AISeL, (2010)Differences in Critical Success Factors in ERP Systems Implementation in Australia and China: A Cultural Analysis., , , , , and . ECIS, page 537-544. (2000)The role of knowledge management in moving to a customer-focused organisation., and . ECIS, page 721-729. (2001)Meeting privacy obligations: the implications for information systems development., , and . ECIS, page 1035-1050. (2003)Creating Value With Business Analytics In The Supply Chain., and . ECIS, page 47. (2013)