Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intergenerational Tensions in ICT Adoption for Independent and healthy ageing: Preliminary Insights from a Value-Focused Thinking Study in Poland and Sweden., , and . ECIS, (2023)Supporting Active and Healthy Ageing by ICT Solutions: Preliminary Lessons Learned from Polish, Swedish and Latvian Older Adults., , , and . SIGSAND/PLAIS, volume 359 of Lecture Notes in Business Information Processing, page 48-61. Springer, (2019)Supporting Seniors in Independent and Healthy Ageing through ICT: Insights from a Value-Focused Thinking Study in Latvia, Poland and Sweden., , , , and . HICSS, page 1-10. ScholarSpace, (2021)The Role of Gender in Supporting Active and Healthy Ageing by ICT Solutions: Learning from Latvian, Polish and Swedish Older Adults., , , and . EMCIS, volume 381 of Lecture Notes in Business Information Processing, page 344-357. Springer, (2019)Important Issues for Preventing Cyberstalking in India., , and . AMCIS, Association for Information Systems, (2019)Value Sensitive Approach to IS Security - A Socio-Organizational Perspective.. AMCIS, page 442. Association for Information Systems, (2005)Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies., and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 384-397. Springer, (2016)What Goes Around Comes Around; Effects of Unclear Questionnaire Items in Information Security Research., , and . HAISA, volume 674 of IFIP Advances in Information and Communication Technology, page 470-481. Springer, (2023)Can a Cloud Be Really Secure? A Socratic Dialogue., and . Computers, Privacy and Data Protection, Springer, (2011)Trusting and Adopting E-Government Services in Developing Countries? Privacy Concerns and Practices in Rwanda., , and . EGOV, volume 10428 of Lecture Notes in Computer Science, page 324-335. Springer, (2017)