Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technical Feasibility and Relative Productivity of Alternate NASA Robotic Missions to a Lunar Dark Crater., , , , , , , , , and . IEEE Syst. J., 2 (1): 120-128 (2008)Analysis of Concepts for Large-Scale Robotic Lunar Precursor Missions., , , , , , , , and . SoSE, page 1-6. IEEE, (2007)Changing Definitions of Internal Control and Information Systems Integrity.. IICIS, volume 109 of IFIP Conference Proceedings, page 255-272. Chapman Hall, (1997)Detecting High Orders of Cognitive Complexity in Students' Reasoning in Argumentative Writing About Ocean Acidification., , , , , and . LAK, page 586-591. ACM, (2021)Communications Security, LAN Security, and Viruses.. Information Systems Security, 3 (3): 32-36 (1994)Security in Cyberspace (and Some Legal Issues).. Information Systems Security, 4 (3): 32-37 (1995)Pricing Computer Services.. IFIP Congress, page 477-480. North-Holland/IFIP, (1983)The role of the computer auditor in information systems development(Panel Discussion)., , , and . ACM Annual Conference, page 97. ACM, (1976)Germans as Victims? Thoughts on a post-Cold War History of World War II's Legacies. History and Memory, 1/2 (17): 147--194 (2005)Computer Viruses.. Inf. Secur. J. A Glob. Perspect., 1 (1): 27-30 (1992)