Author of the publication

Minimizing Technology Ricks with PIAs, Precaution, and Participation.

, , , and . IEEE Technol. Soc. Mag., 30 (4): 47-54 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structuring stakeholder e-inclusion needs.. J. Inf., Comm, Ethics in Society, 8 (2): 178-205 (2010)Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure., , , , and . CRITIS, volume 6027 of Lecture Notes in Computer Science, page 201-212. Springer, (2009)Evolution of Standards for Smart Grid Communications.. Int. J. Interdiscip. Telecommun. Netw., 4 (1): 47-55 (2012)The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues., , , and . SPC, volume 3934 of Lecture Notes in Computer Science, page 119-133. Springer, (2006)Privacy, identity and security in ambient intelligence: A scenario analysis., , , and . Telematics Informatics, 24 (1): 15-29 (2007)The state of the art in privacy impact assessment.. Comput. Law Secur. Rev., 28 (1): 54-61 (2012)Redesigning consent forms and processes for health research.. IPCC, page 1-2. IEEE, (2012)Trust in the Pi-Calculus., and . PPDP, page 103-114. ACM, (2001)To imprison or not to imprison: an analytics model for drug courts., , , and . Ann. Oper. Res., 303 (1): 101-124 (2021)Preliminary interdependency analysis: An approach to support critical-infrastructure risk-assessment., , , , and . Reliab. Eng. Syst. Saf., (2017)