Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study of Consumer Perceptions and Comprehension of Web Site Privacy Policies., , and . IEEE Trans. Engineering Management, 55 (3): 442-454 (2008)Examining Internet privacy policies within the context of user privacy values., , , and . IEEE Trans. Engineering Management, 52 (2): 227-237 (2005)Privacy Policy Representation in Web-based Healthcare., , and . AMCIS, page 323. Association for Information Systems, (2006)Evaluating Legal Implementation Readiness Decision-Making., , and . IEEE Trans. Software Eng., 41 (6): 545-564 (2015)A roadmap for comprehensive online privacy policy management., , , and . Commun. ACM, 50 (7): 109-116 (2007)Aligning Requirements with HIPAA in the iTrust System., , and . RE, page 335-336. IEEE Computer Society, (2008)Addressing Legal Requirements in Requirements Engineering., and . RE, page 5-14. IEEE Computer Society, (2007)Evolving Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping Model., , , and . RE, page 94-101. IEEE Computer Society, (2001)An Initial Exploration of the Relationship Between Pair Programming and Brooks' Law., , and . Agile Development Conference, page 11-20. IEEE Computer Society, (2004)A Prototype System for Transnational Information Sharing and Process Coordination., , , , , , , , , and 14 other author(s). DG.O, Digital Government Research Center, (2004)