From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Profiling with Big Data: Identifying Privacy Implication for Individuals, Groups and Society., и . MCIS, стр. 4. AISeL, (2018)Opportunities and Challenges for Reflective Data-Objects in Long-Distance Relationships., и . INTERACT (5), том 12936 из Lecture Notes in Computer Science, стр. 42-62. Springer, (2021)Electronic Voting Systems: Security Implications of the Administrative Workflow., , , , , и . DEXA Workshops, стр. 467-471. IEEE Computer Society, (2003)Employing Ontologies for the Development of Security Critical Applications., , , , , , и . I3E, том 189 из IFIP, стр. 187-201. Springer, (2005)Implementation Challenges for Information Security Awareness Initiatives in E-Government., , и . ECIS, стр. 179. (2012)Using the Lens of Circuits of Power in Information Systems Security Management., , и . TrustBus, том 4657 из Lecture Notes in Computer Science, стр. 228-236. Springer, (2007)Redefining Information Systems Security: Viable Information Systems., , и . SEC, том 193 из IFIP Conference Proceedings, стр. 453-468. Kluwer, (2001)Formulating information systems risk management strategies through cultural theory., , , и . Inf. Manag. Comput. Secur., 14 (3): 198-217 (2006)Data Agents: Promoting Reflection through Meaningful Representations of Personal Data in Everyday Life., , и . CHI, стр. 367:1-367:11. ACM, (2021)A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions., , и . EUC Workshops, том 4809 из Lecture Notes in Computer Science, стр. 12-21. Springer, (2007)