Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Cooperation in IT Teams using a Fuzzy Multicriteria Sorting Method., , and . AMCIS, Association for Information Systems, (2013)A multidimensional approach to information security risk management using FMEA and fuzzy theory., , , , and . Int. J. Inf. Manag., 34 (6): 733-740 (2014)World Class Manufacturing performance measurement using a maturity model and the FlowSort method., , and . Int. J. Prod. Res., 59 (24): 7374-7389 (2021)A nominal classification method using minimum profiles to classify IT service contractors., , , and . SMC, page 3329-3333. IEEE, (2017)Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory., , , , and . Int. J. Inf. Manag., (2018)A strategic conflict analysis in IT outsourcing using the graph model for conflict resolution., , , and . J. Enterp. Inf. Manag., 33 (6): 1581-1598 (2020)A Decision Support System for Sizing the Call Center of an Electrical Power Distributor., , , , , and . Int. J. Decis. Support Syst. Technol., 6 (2): 63-76 (2014)The integration of VFT and FITradeoff multicriteria method for the selection of WCM projects., , , and . SMC, page 1513-1517. IEEE, (2019)Information security risk analysis model using fuzzy decision theory., , , , and . Int. J. Inf. Manag., 36 (1): 25-34 (2016)A multicriteria model for assessing maturity in industry 4.0 context., , and . J. Ind. Inf. Integr., (March 2024)