Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Big data in the public sector: Uncertainties and readiness., , , and . Inf. Syst. Frontiers, 19 (2): 267-283 (2017)The perils and pitfalls of explainable AI: Strategies for explaining algorithmic decision-making., , and . Gov. Inf. Q., 39 (2): 101666 (2022)Building Cybersecurity Awareness: The need for evidence-based framing strategies., and . Gov. Inf. Q., 34 (1): 1-7 (2017)Learning from Disasters: Why Is It So Hard?, and . ISTAS, page 1-7. IEEE, (2007)Learning from disasters., and . IEEE Technol. Soc. Mag., 28 (3): 28-36 (2009)Exploring the Boundaries of Successful GSS Application: Supporting Inter-Organizational Policy Networks., and . HICSS, IEEE Computer Society, (1999)Effective Knowledge Management in Professional Organizations: Going by the Rules., and . HICSS, page 108. IEEE Computer Society, (2002)System and Actor Perspectives on Sociotechnical Systems., and . IEEE Trans. Syst. Man Cybern. Part A, 39 (5): 981-992 (2009)Managing infrastructure vulnerability: An empirical study on the use of performance management systems that seek to reduce vulnerability of network industries., , and . ISTAS, page 1-7. IEEE, (2007)Complexity requires complexity: creating fits between technology and public decision-making in large projects., , and . ISTAS, page 214-224. IEEE, (1996)