Author of the publication

The health information system security threat lifecycle: An informatics theory.

, and . Int. J. Medical Informatics, 78 (12): 815-826 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Laptops on Trolleys: Lessons from a Mobile-Wireless Hospital Ward., and . J. Medical Syst., 36 (6): 3933-3943 (2012)Towards a framework for mobile information environments: a hospital-based example., , , , and . MoMM, page 490-494. ACM, (2008)Gestural Interface Technology in Early Childhood Education: A Framework for Fully Engaged Communication., , , and . HICSS, page 13-20. IEEE Computer Society, (2013)Evolution of Local Government E-Services: The Applicability of E-Business Maturity Models., , and . HICSS, IEEE Computer Society, (2004)Implementation Issues for Mobile-Wireless Infrastructure and Mobile Health Care Computing Devices for a Hospital Ward Setting., , , , and . J. Medical Syst., 34 (4): 509-518 (2010)From Dog Licences to Democracy: Local Government Approaches to E-Service Delivery in Australia., , and . ECIS, page 724-735. (2005)The Natural Hospital Environment: A Socio-Technical-Material perspective., and . Int. J. Medical Informatics, 83 (2): 140-158 (2014)Modus Vivendi of E-Business., , , , , and . PACIS, page 99. AISeL, (2005)Editorial., , , and . Inf. Syst. J., 23 (2): 111-114 (2013)Women in ICT: guidelines for evaluating intervention programmes., , and . ECIS, page 52. (2011)