Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ethically Intelligent? A Framework for Exploring Human Resource Management Challenges of Intelligent Working Environments., and . ISAmI, volume 219 of Advances in Intelligent Systems and Computing, page 213-219. Springer, (2013)Web Futures: Inclusive, Intelligent, Sustainable The 2020 Manifesto for Web Science, , , , , , , and . Dagstuhl Manifestos, (2021)"i always feel it must be great to be a hacker!": the role of interdisciplinary work in social media research., and . WebSci, page 91-98. ACM, (2014)Under Lock and Key? Setting up a Secure Data Center at GESIS in Germany., and . IASSIST Conference, IASSIST, (2013)Achieving real data security via community self-enforcement., and . IASSIST Conference, IASSIST, (2013)Legally Bound? Data Protection Legislation and Research Practice., and . IASSIST Conference, IASSIST, (2013)Web Research Ethics: Confidentiality, Consent, Data Integrity & More., and . WebSci (Companion), page 21-22. ACM, (2019)Can Security Become a Routine?: A Study of Organizational Change in an Agile Software Development Group., , , , and . CSCW, page 2489-2503. ACM, (2017)Bias in data-driven artificial intelligence systems—An introductory survey, , , , , , , , , and 13 other author(s). WIREs Data Mining and Knowledge Discovery, (February 2020)Bias in data-driven artificial intelligence systems - An introductory survey., , , , , , , , , and 13 other author(s). WIREs Data Mining Knowl. Discov., (2020)