Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Connecting Readers with Open Access Resources: The CUFTS Free! Open Access Collections Group., , , , , , , , , and 7 other author(s). ELPUB, page 461-470. (2009)Enterprise Modeling based on Responsibility., and . Trust in Technology, volume 36 of Computer Supported Cooperative Work, Springer, (2006)Exploring the Dialectics Underlying Institutionalization of IT Artifacts., and . J. Assoc. Inf. Syst., 18 (12): 4 (2017)New security paradigms: what other concepts do we need as well?. NSPW, page 7-18. ACM, (1993)Deriving Information Requirements from Responsibility Models., , , and . CAiSE, volume 5565 of Lecture Notes in Computer Science, page 515-529. Springer, (2009)Utilising the Internet to Improve Peasant Artisan Incomes: Evidence from Mexico., , and . HCC, volume 328 of IFIP Advances in Information and Communication Technology, page 292-309. Springer, (2010)Messages, communication, information security and value.. NSPW, page 10-19. IEEE Computer Society Press, (1994)Reliability and Security Issues in Distributed Computing Systems., and . Symposium on Reliability in Distributed Software and Database Systems, page 113-118. IEEE Computer Society, (1986)Messages, Communication, Information Security: Protecting the User from the Data., and . DBSec, volume 51 of IFIP Conference Proceedings, page 8-23. Chapman & Hall, (1995)Conversation Structures as a Means of Specifying Security Policy.. DBSec, page 25-39. North-Holland, (1989)