Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Laypeople and Experts risk perception of Cloud Computing Services., and . CoRR, (2015)Computational Concerns in the Integration of Unmanned Airborne Systems into Controlled Airspace.. SAFECOMP, volume 6351 of Lecture Notes in Computer Science, page 142-154. Springer, (2010)Correction to: An evaluation of the formalised AcciMap approach for accident analysis in healthcare., , and . Cogn. Technol. Work., 24 (1): 209 (2022)Extending the application of formal methods to analyse human error and system failure during accident investigations., and . Softw. Eng. J., 11 (6): 355-365 (1996)Crisees: Real-Time Monitoring of Social Media Streams to Support Crisis Management., , , , and . ECIR, volume 7224 of Lecture Notes in Computer Science, page 573-575. Springer, (2012)Software in military aviation and drone mishaps: Analysis and recommendations for the investigation process., , , and . Reliab. Eng. Syst. Saf., (2015)#trapped!: social media search system requirements for emergency management professionals., , and . SIGIR, page 1073-1076. ACM, (2013)On the Safety Implications of E-Governance: Assessing the Hazards of Enterprise Information Architectures in Safety-Critical Applications., and . SAFECOMP, volume 6351 of Lecture Notes in Computer Science, page 402-417. Springer, (2010)Using Programmable Data Networks to Detect Critical Infrastructure Challenges., , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 209-221. Springer, (2014)Case Studies in the Socio-technical Analysis of Cybersecurity Incidents: Comparing Attacks on the UK NHS and Irish Healthcare Systems., and . Cyber Science, page 375-387. Springer, (2022)