Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Legal Implementation Readiness Decision-Making., , and . IEEE Trans. Software Eng., 41 (6): 545-564 (2015)Examining Internet privacy policies within the context of user privacy values., , , and . IEEE Trans. Engineering Management, 52 (2): 227-237 (2005)An Empirical Study of Consumer Perceptions and Comprehension of Web Site Privacy Policies., , and . IEEE Trans. Engineering Management, 55 (3): 442-454 (2008)Privacy Policy Representation in Web-based Healthcare., , and . AMCIS, page 323. Association for Information Systems, (2006)A roadmap for comprehensive online privacy policy management., , , and . Commun. ACM, 50 (7): 109-116 (2007)Addressing Legal Requirements in Requirements Engineering., and . RE, page 5-14. IEEE Computer Society, (2007)Aligning Requirements with HIPAA in the iTrust System., , and . RE, page 335-336. IEEE Computer Society, (2008)Evolving Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping Model., , , and . RE, page 94-101. IEEE Computer Society, (2001)An Initial Exploration of the Relationship Between Pair Programming and Brooks' Law., , and . Agile Development Conference, page 11-20. IEEE Computer Society, (2004)A Prototype System for Transnational Information Sharing and Process Coordination., , , , , , , , , and 14 other author(s). DG.O, Digital Government Research Center, (2004)