Author of the publication

Can Security Become a Routine?: A Study of Organizational Change in an Agile Software Development Group.

, , , , and . CSCW, page 2489-2503. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web Futures: Inclusive, Intelligent, Sustainable The 2020 Manifesto for Web Science, , , , , , , and . Dagstuhl Manifestos, (2021)Ethically Intelligent? A Framework for Exploring Human Resource Management Challenges of Intelligent Working Environments., and . ISAmI, volume 219 of Advances in Intelligent Systems and Computing, page 213-219. Springer, (2013)"i always feel it must be great to be a hacker!": the role of interdisciplinary work in social media research., and . WebSci, page 91-98. ACM, (2014)Bias in data-driven artificial intelligence systems—An introductory survey, , , , , , , , , and 13 other author(s). WIREs Data Mining and Knowledge Discovery, (February 2020)Bias in data-driven artificial intelligence systems - An introductory survey., , , , , , , , , and 13 other author(s). WIREs Data Mining Knowl. Discov., (2020)The practical and ethical challenges in acquiring and sharing digital trace data: Negotiating public-private partnerships., , and . New Media Soc., (2020)The Ethics of Doing Web Science Research: Panel Abstract., and . WebSci, page 1. ACM, (2017)Under Lock and Key? Setting up a Secure Data Center at GESIS in Germany., and . IASSIST Conference, IASSIST, (2013)Achieving real data security via community self-enforcement., and . IASSIST Conference, IASSIST, (2013)Legally Bound? Data Protection Legislation and Research Practice., and . IASSIST Conference, IASSIST, (2013)