Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maturing Pay-as-you-go Data Quality Management: Towards Decision Support for Paying the Larger Bills., , , and . DATA (Revised Selected Papers), volume 737 of Communications in Computer and Information Science, page 102-124. Springer, (2016)Context sensitive access control., , , , and . SACMAT, page 111-119. ACM, (2005)On Enabling Smart Government: A Legal Logistics Framework for Future Criminal Justice Systems., , , , and . DG.O, page 293-302. ACM, (2016)Towards Applying Design-Thinking for Designing Privacy-Protecting Information Systems., and . TPS-ISA, page 196-202. IEEE, (2019)A Conceptual Framework for Addressing IoT Threats: Challenges in Meeting Challenges., , , , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2018)A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence., , , , and . EISIC, page 113-120. IEEE Computer Society, (2015)Exploring a Warrior Paradigm to Design Out Cybercrime., , , and . EISIC, page 84-90. IEEE Computer Society, (2012)Compressing Large Amounts of NetFlow Data Using a Pattern Classification Scheme., , , , and . BigDataSecurity/HPSC/IDS, page 364-370. IEEE, (2016)The Praxis of HR Analytics., , and . I3E, volume 11701 of Lecture Notes in Computer Science, page 190-202. Springer, (2019)A structured framework for federation between 4G-service platforms., , and . PIMRC, page 2626-2630. IEEE, (2003)