Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Opening Privacy Sensitive Microdata Sets in Light of GDPR., , , , , and . DG.O, page 314-323. ACM, (2019)Trusted third parties for secure and privacy-preserving data integration and sharing in the public sector., , , and . DG.O, page 135-144. ACM, (2012)Representing narrative and testimonial knowledge in sense-making software for crime analysis., , , and . JURIX, volume 189 of Frontiers in Artificial Intelligence and Applications, page 160-169. IOS Press, (2008)Embedding Personal Data Minimization Technologies in Organizations: Needs, Vision and Artifacts., , , , , and . ICEGOV, page 71-79. ACM, (2021)On opening sensitive data sets in light of GDPR., , , , and . ICEGOV, page 510-512. ACM, (2019)A Big Data Approach to Support Information Distribution in Crisis Response., , , and . ICEGOV, page 266-275. ACM, (2016)AVER: Argument Visualization for Evidential Reasoning., and . JURIX, volume 152 of Frontiers in Artificial Intelligence and Applications, page 151-156. IOS Press, (2006)Fraud Indicators Applied to Legal Entities: An Empirical Ranking Approach., , and . DEXA (2), volume 8645 of Lecture Notes in Computer Science, page 106-115. Springer, (2014)A method for explaining and predicting trends: an application to the Dutch justice system., , , and . ICAIL, page 66-70. ACM, (2011)Mapping crime descriptions to law articles using deep learning., , , , and . ICEGOV, page 33-43. ACM, (2020)