Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust vehicle environment reconstruction from point clouds for irregularity detection., , , , , and . Intelligent Vehicles Symposium, page 1085-1092. IEEE, (2017)Internet Privacy Concerns Revisited: Oversight from Surveillance and Right To Be Forgotten as New Dimensions., and . Inf. Manag., 59 (3): 103618 (2022)Using EDCA to improve vehicle safety messaging., , , and . VNC, page 70-77. IEEE, (2012)Trust Drops when Insiders Drop the Ball: The Role of Age, Gender, and Privacy Concern in Insider Data Breaches.. AMCIS, Association for Information Systems, (2017)Interaction Effect of Gender and Neutralization Techniques on Information Security Policy Compliance: An Ethical Perspective., and . AMCIS, Association for Information Systems, (2016)Collaborative Perception for Automated Vehicles Leveraging Vehicle-to-Vehicle Communications., , , and . Intelligent Vehicles Symposium, page 1099-1106. IEEE, (2018)Comparing LIMERIC and DCC approaches for VANET channel congestion control., , , , , and . WiVeC, page 1-7. IEEE, (2014)Achieving weighted-fairnessin message rate-based congestion control for DSRC systems., and . WiVeC, page 1-5. IEEE, (2013)Internalization of Gender Roles: Challenges for Female CIOs in Ensuring IT Security Compliance., and . AMCIS, Association for Information Systems, (2023)Developing Multidimensional Scale for measuring Social Media Habit: A Nomological Examination in the Context of Cyberbullying., and . AMCIS, Association for Information Systems, (2021)