Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why file sharing networks are dangerous?, , and . Commun. ACM, 52 (2): 134-138 (2009)Focus on health information technology, electronic health records and their financial impact: Medication administration quality and health information technology: a national study of US hospitals., , , and . J. Am. Medical Informatics Assoc., 19 (3): 360-367 (2012)Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?, and . MIS Q., (2018)Performance Analysis of Split-Case Sorting Systems., and . Manuf. Serv. Oper. Manag., 4 (4): 258-274 (2002)Security practices and regulatory compliance in the healthcare industry., and . JAMIA, 20 (1): 44-51 (2013)Data Hemorrhages in the Health-Care Sector.. Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, page 71-89. Springer, (2009)Going Spear Phishing: Exploring Embedded Training and Awareness., , , and . IEEE Secur. Priv., 12 (1): 28-38 (2014)EMBEDR: Distinguishing signal from noise in single-cell omics data., , and . Patterns, 3 (3): 100443 (2022)Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance., and . WEIS, (2012)The Impact of Security Practices on Regulatory Compliance and Security Performance., and . ICIS, Association for Information Systems, (2011)