Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Business Value Assurance in Large-Scale IT Projects - A Quantitative Method Based on Founded Requirements Assessment., , , and . ACM Trans. Manag. Inf. Syst., 5 (3): 12:1-12:17 (2014)Using financial derivatives to hedge against market risks in IT outsourcing projects - a quantitative decision model., , and . J. Decis. Syst., 22 (4): 249-264 (2013)Digital Identities and Verifiable Credentials., , , and . Bus. Inf. Syst. Eng., 63 (5): 603-613 (2021)Unchaining Social Businesses - Blockchain as the Basic Technology of a Crowdlending Platform., , , and . ICIS, Association for Information Systems, (2017)Trustful Coopetitive Infrastructures for the New Space Exploration Era., , , , , , and . CoRR, (2024)Affordance-Experimentation-Actualization Theory in Artificial Intelligence Research - A Predictive Maintenance Story., , , , and . ICIS, Association for Information Systems, (2019)Blockchain in der öffentlichen Verwaltung - Unterstützung der Zusammenarbeit im Asylprozess., , , and . Inform. Spektrum, 42 (3): 174-181 (2019)The Blockchain Effect: From Inter-Ecosystem to Intra-Ecosystem Competition., , , and . ECIS, (2021)Guiding Refugees Through European Bureaucracy: Designing a Trustworthy Mobile App for Document Management., , , , and . DESRIST, volume 13229 of Lecture Notes in Computer Science, page 171-182. Springer, (2022)Artificial Intelligence in Energy Demand Response: A Taxonomy of Input Data Requirements., , , , and . Wirtschaftsinformatik, AISeL, (2022)