Author of the publication

Methods for Practising Ethics in Research and Innovation: A Literature Review, Critical Analysis and Recommendations.

, , , , , , and . Sci. Eng. Ethics, 24 (5): 1437-1481 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy, identity and security in ambient intelligence: A scenario analysis., , , and . Telematics and Informatics, 24 (1): 15-29 (2007)Evolution of Standards for Smart Grid Communications.. IJITN, 4 (1): 47-55 (2012)Constructing next generation academic cloud services., , , , , , , , , and 4 other author(s). IJCC, 2 (2/3): 104-122 (2013)Redesigning consent forms and processes for health research.. IPCC, page 1-2. (2012)Structuring stakeholder e-inclusion needs.. J. Inf., Comm, Ethics in Society, 8 (2): 178-205 (2010)Conservative claims about the probability of perfection of software-based systems., , , and . ISSRE, page 130-140. IEEE Computer Society, (2015)The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues., , , and . SPC, volume 3934 of Lecture Notes in Computer Science, page 119-133. Springer, (2006)Trust in the Pi-Calculus., and . PPDP, page 103-114. ACM, (2001)Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure., , , , and . CRITIS, volume 6027 of Lecture Notes in Computer Science, page 201-212. Springer, (2009)CS/SE Instructors Can Improve Student Writing without Reducing Class Time Devoted to Technical Content: Experimental Results., , , , , , and . ICSE (2), page 455-464. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).