Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empathy for Hackers - an IT Security Risk Assessment Artifact for Targeted Hacker Attacks., , and . ECIS, (2021)How WashTec Explored Digital Business Models., , , , , , and . MIS Q. Executive, 22 (3): 3 (2023)Fused Projection-Based Point Cloud Segmentation., , and . Sensors, 22 (3): 1139 (2022)Security First, Security by Design, or Security Pragmatism - Strategic Roles of IT Security in Digitalization Projects., , , and . Comput. Secur., (2022)The Digital 'War for Talents' - a Conceptual Framework of Technology-Driven Factors in Digital Personnel Selection Systems., , , and . ICIS, Association for Information Systems, (2021)Reconstructing Geometrical Models of Indoor Environments Based on Point Clouds., , and . Remote. Sens., 15 (18): 4421 (September 2023)Managing the Inevitable - A Maturity Model to Establish Incident Response Management Capabilities., , , , , and . Comput. Secur., (2023)How Agile is Your IT Department? - Development and Application of an Framework-Independent Agile Scaling Maturity Model., , , , and . ECIS, (2022)Intelligent Innovation Processes - the potential of AI for Digital Innovation Processes., , , , and . PACIS, page 13. (2021)Becoming a Product-Service System Provider - A Maturity Model for Manufacturers., , , and . Wirtschaftsinformatik, AISeL, (2021)