Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using lessons from health care to protect the privacy of library users: Guidelines for the de-identification of library data based on HIPAA., and . J. Assoc. Inf. Sci. Technol., 58 (8): 1198-1206 (2007)Reference Extract: Extending the Reach of Digital Reference through Collaborative Data Warehousing., and . Bull. IEEE Tech. Comm. Digit. Libr., (2005)Book reviews: Models for library management, decision-making, and planning.. J. Assoc. Inf. Sci. Technol., 54 (4): 359-360 (2003)Organizational Cultures of Libraries as a Strategic Resource., , , and . Libr. Trends, 53 (1): 33-53 (2004)Three Different Paths for Tabletop Gaming in School Libraries., , , and . Libr. Trends, 61 (4): 825-835 (2013)Connections for game education and research in the iSchools.. iConference, page 725-727. ACM, (2011)Raising reliability of web search tool research through replication and chaos theory.. JASIS, 51 (8): 724-729 (2000)A framework for Internet archeology: Discovering use patterns in digital library and Web-based information resources.. First Monday, (2005)How are libraries supporting gaming: A pilot exploration.. ASIST, volume 45 of Proc. Assoc. Inf. Sci. Technol., page 1-4. Wiley, (2008)The bibliomining process: Data warehousing and data mining for libraries. Sponsored by SIG LT., , , and . ASIST, volume 40 of Proc. Assoc. Inf. Sci. Technol., page 478-479. Wiley, (2003)