Author of the publication

Investigating IT Standardization Process Through the Lens of Theory of Communicative Action.

, , and . WEB, volume 258 of Lecture Notes in Business Information Processing, page 40-53. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating IT Standardization Process Through the Lens of Theory of Communicative Action., , and . WEB, volume 258 of Lecture Notes in Business Information Processing, page 40-53. Springer, (2015)Insights from U.S. Experience to Guide International Reliance on Standardization: Achieving Supply Chain Sustainability.. Int. J. Appl. Logist., 4 (3): 25-46 (2013)Legal ontology of sales law application to ecommerce., and . Artif. Intell. Law, 15 (2): 155-170 (2007)Empirical analysis of anticipatory standardization processes: a case study., , and . Inf. Syst. E Bus. Manag., 10 (3): 325-350 (2012)Implications of agent-based supply chain games., , , , , and . SMC (3), page 2125-2130. IEEE, (2004)Development and Delivery of Coursework: The Legal/Regulatory/Policy Environment of Cyberforensics., and . J. Digit. Forensics Secur. Law, 1 (2): 39-74 (2006)Using Problems to Learn Service-Oriented Computing., , , , , , , , and . SERVICES I, page 33-36. IEEE Computer Society, (2008)Using ESI discovery teams to manage electronic data discovery., and . Commun. ACM, 53 (7): 142-144 (2010)E-government evolution in small municipalities in Pennsylvania in web 2.0 social environment: a poster., , and . DG.O, page 273-274. ACM, (2013)Regulating Privacy in Wireless Advertising Messaging: FIPP Compliance by Policy vs. by Design., , and . Privacy Enhancing Technologies, volume 5672 of Lecture Notes in Computer Science, page 19-36. Springer, (2009)