Author of the publication

Mapping and Usage of Know-How Contributions.

, , , , and . CAiSE Forum (Selected Extended Papers), volume 204 of Lecture Notes in Business Information Processing, page 102-115. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling DevOps Deployment Choices Using Process Architecture Design Dimensions., , and . PoEM, volume 235 of Lecture Notes in Business Information Processing, page 322-337. Springer, (2015)Towards Actionable Business Intelligence: Can System Dynamics Help?, , and . PoEM, volume 197 of Lecture Notes in Business Information Processing, page 246-260. Springer, (2014)From Business Intelligence Insights to Actions: A Methodology for Closing the Sense-and-Respond Loop in the Adaptive Enterprise., and . PoEM, volume 165 of Lecture Notes in Business Information Processing, page 114-128. Springer, (2013)Detecting Judgment Inconsistencies to Encourage Model Iteration in Interactive i* Analysis., and . iStar, volume 766 of CEUR Workshop Proceedings, page 20-25. CEUR-WS.org, (2011)Analyzing Psychological Goals in Gamified Applications Using i., , and . iStar@ER, volume 2490 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Aligning Data Warehouse Requirements with Business Goals., , and . iStar, volume 978 of CEUR Workshop Proceedings, page 67-72. CEUR-WS.org, (2013)Responding to Ongoing Change: Challenges for Information Systems Modeling., , and . Int. J. Inf. Syst. Model. Des., 5 (4): 48-70 (2014)Secure-I*: Engineering Secure Software Systems through Social Analysis., , and . Int. J. Softw. Informatics, 3 (1): 89-120 (2009)A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities., , and . Requir. Eng., 15 (1): 41-62 (2010)Solution Patterns for Machine Learning., , , , , and . CAiSE, volume 11483 of Lecture Notes in Computer Science, page 627-642. Springer, (2019)