Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Hemorrhages in the Health-Care Sector.. Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, page 71-89. Springer, (2009)Why file sharing networks are dangerous?, , and . Commun. ACM, 52 (2): 134-138 (2009)EMBEDR: Distinguishing signal from noise in single-cell omics data., , and . Patterns, 3 (3): 100443 (2022)Going Spear Phishing: Exploring Embedded Training and Awareness., , , and . IEEE Secur. Priv., 12 (1): 28-38 (2014)Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?, and . MIS Q., (2018)Security practices and regulatory compliance in the healthcare industry., and . JAMIA, 20 (1): 44-51 (2013)Focus on health information technology, electronic health records and their financial impact: Medication administration quality and health information technology: a national study of US hospitals., , , and . J. Am. Medical Informatics Assoc., 19 (3): 360-367 (2012)Performance Analysis of Split-Case Sorting Systems., and . Manuf. Serv. Oper. Manag., 4 (4): 258-274 (2002)The Impact of Information Security Rating on Vendor Competition., and . AMCIS, page 280. Association for Information Systems, (2009)Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance., and . WEIS, (2012)