Author of the publication

Sensor Networks or Smart Artifacts? An Exploration of Organizational Issues of an Industrial Health and Safety Monitoring System.

, , , , , , , , and . UbiComp, volume 4717 of Lecture Notes in Computer Science, page 465-482. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ubiquitous technologies, cultural logics and paternalism in industrial workplaces., , and . Poiesis Prax., 5 (3-4): 265-290 (2008)Ethically Intelligent? A Framework for Exploring Human Resource Management Challenges of Intelligent Working Environments., and . ISAmI, volume 219 of Advances in Intelligent Systems and Computing, page 213-219. Springer, (2013)Web Futures: Inclusive, Intelligent, Sustainable The 2020 Manifesto for Web Science, , , , , , , and . Dagstuhl Manifestos, (2021)"i always feel it must be great to be a hacker!": the role of interdisciplinary work in social media research., and . WebSci, page 91-98. ACM, (2014)Archiving information from geotagged tweets to promote reproducibility and comparability in social media research, , , , and . Big Data & Society, 4 (2): 205395171773633 (November 2017)Knowing in Algorithmic Regimes: Insights from a Roundtable, Discussion on Methods, Interactions and Politics., , , , , and . (2023)Fairness in Agreement With European Values: An Interdisciplinary Perspective on AI Regulation., , , , , , , and . AIES, page 107-118. ACM, (2022)Under Lock and Key? Setting up a Secure Data Center at GESIS in Germany., and . IASSIST Conference, IASSIST, (2013)Achieving real data security via community self-enforcement., and . IASSIST Conference, IASSIST, (2013)Legally Bound? Data Protection Legislation and Research Practice., and . IASSIST Conference, IASSIST, (2013)