Author of the publication

General Description of the Process of Behavioural Profiling.

, and . Profiling the European Citizen, Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the discipline of information systems., , and . Inf. Syst. J., 1 (1): 19-27 (1991)Current directions in IS security research: towards socio-organizational perspectives., and . Inf. Syst. J., 11 (2): 127-154 (2001)Signalling Intentions and Obliging Behavior Online: An Application of Semiotic and Legal Modeling in E-Commerce., and . JOEUC, 12 (2): 33-42 (2000)Measur: Method For Eliciting, Analysing and Specifying User Requirements., , and . Computerized Assistance During the Information Systems Life Cycle, page 67-115. North-Holland, (1988)Information system security management in the new millennium., and . Commun. ACM, 43 (7): 125-128 (2000)Institutionalizing operational risk management: an empirical study., , and . JIT, 29 (1): 59-72 (2014)Using Structuration Theory in IS Research: Operationalizing Key Constructs., and . ICIS, page 127. Association for Information Systems, (2007)Editorial: JSIS Security and Privacy Special Issue., , and . J. Strateg. Inf. Syst., 16 (2): 127-129 (2007)The Circuits-of-Power Framework for Studying Power in Institutionalization of Information Systems., and . J. Assoc. Inf. Syst., (2003)Information Systems Security Education: Redressing the Balance of Theory and Practice., and . J. Inf. Syst. Educ., 13 (3): 211-218 (2002)