Author of the publication

Exploring Security and Privacy Issues in Hospital Information System: An Information Boundary Theory Perspective.

, , and . AMIA, AMIA, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Education for eScience Professionals: Integrating Data Curation and Cyberinfrastructure., , and . IJDC, 6 (1): 125-138 (2011)Analysis of end user security behaviors., , , and . Comput. Secur., 24 (2): 124-133 (2005)A Detailed Analysis of Task Performance With and Without Computer Monitoring., and . Int. J. Hum. Comput. Interact., 16 (2): 345-366 (2003)Spreading the word: the proliferation of research using social networks., , and . iConference, page 767-769. ACM, (2011)Charging Control and Transaction Accounting Mechanisms Using IRTL (Information Resource Transaction Layer) Middleware for P2P Services., , , , and . QofIS, volume 2511 of Lecture Notes in Computer Science, page 239-249. Springer, (2002)Examining Personal and Cultural Assumptions about Information Technology using a Technology Abstinence Exercise., and . J. Inf. Syst. Educ., 15 (1): 87-97 (2004)The Origin and Value of Disagreement Among Data Labelers: A Case Study of Individual Differences in Hate Speech Annotation., and . iConference (1), volume 13192 of Lecture Notes in Computer Science, page 425-444. Springer, (2022)Organizational Cultures of Libraries as a Strategic Resource., , , and . Libr. Trends, 53 (1): 33-53 (2004)eScience professional positions in the job market: a content analysis of job advertisements., , and . iConference, page 630-631. ACM, (2011)Beyond being (t)here: the social and personal implications of making music at a distance., and . iConference, page 686-687. ACM, (2011)