Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tele-collaboration in Parallel Worlds., , and . ETP@MM, page 67-69. ACM, (2003)A Collaborative Tool for Synchronous Distance Education., , , , and . CATE, page 438-443. ACTA Press, (2004)Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach., , , and . ACIS, page 79. (2016)Implementation Human-Computer Interaction on the Internet of Things Technologies: A Bibliometric Analysis., , , , , and . WorldCIST (1), volume 985 of Lecture Notes in Networks and Systems, page 194-203. Springer, (2024)Understanding Knowledge Leakage & BYOD (Bring Your Own Device): A Mobile Worker Perspective., , , and . CoRR, (2016)A new criterion to validate and improve the classification process of LAMDA algorithm applied to diesel engines., , , and . Eng. Appl. Artif. Intell., (2017)Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations., , , and . PACIS, page 224. (2017)Towards a Knowledge Leakage Mitigation Framework for Mobile Devices in Knowledge-Intensive Organizations., , , and . ECIS, page 72. (2018)Towards a knowledge leakage Mitigation framework for mobile Devices in knowledge-intensive Organizations., , , and . CoRR, (2023)Mitigating the Risk of Knowledge Leakage in Knowledge Intensive Organizations: a Mobile Device Perspective.. CoRR, (2023)