Author of the publication

The security and privacy implications of using social networks to deliver healthcare.

, and . PETRA, ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Gates, Carrie
add a person with the name Gates, Carrie
 

Other publications of authors with the same name

A Risk Management Approach to the "Insider Threat"., , , , , , and . Insider Threats in Cyber Security, volume 49 of Advances in Information Security, Springer, (2010)Defender Personality Traits., and . WISI, volume 3917 of Lecture Notes in Computer Science, page 85-90. Springer, (2006)The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors., and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 228-246. Springer, (2008)Forgive and forget: return to obscurity., , , , and . NSPW, page 1-10. ACM, (2013)The security and privacy implications of using social networks to deliver healthcare., and . PETRA, ACM, (2010)A Psychological Profile of Defender Personality Traits., and . JCP, 2 (2): 84-93 (2007)An Extensible, Human-Centric Framework That Promotes Universal Access to Electronic Commerce., , , and . ISEC, volume 2040 of Lecture Notes in Computer Science, page 116-126. Springer, (2001)Creating an Electronic Commerce Device Which Promotes Universal Access: The KALI Project., , and . DCW, volume 1830 of Lecture Notes in Computer Science, page 2-12. Springer, (2000)Owner-controlled information., and . NSPW, page 103-111. ACM, (2003)Augmenting Machine Learning with Argumentation., , and . NSPW, page 1-11. ACM, (2018)