Author of the publication

Security and compliance challenges in complex IT outsourcing arrangements: A multi-stakeholder perspective.

, , and . Comput. Secur., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kollaboratives Tagging zur inhaltlichen Beschreibung von Lern- und Wissensressourcen, and . XML-Tage 2007, Berlin, (2007)Security Management in Cross-Organizational Settings: A Design Science Approach., , and . ICIS, Association for Information Systems, (2012)Institutionalised collaborative tagging as an instrument for managing the maturing learning and knowledge resources, and . International Journal for Technology Enhanced Learning (IJTEL), 1 (1): 70-84 (2008)A Network-based Tool for Identifying Knowledge Risks in Data-Driven Business Models., , and . HICSS, page 1-10. ScholarSpace, (2021)Capturing Practices of Knowledge Work for Information Systems Design., , , and . ECIS, page 7. (2010)Toward a Visual Analytics Framework for Learning Communities in Industry 4.0., , and . WM, volume 1821 of CEUR Workshop Proceedings, page 129-130. CEUR-WS.org, (2017)Managing and facilitating knowledge creation in collaborative settings., and . MKWI, page 1331-1344. GITO Verlag, (2012)Optimising allocation of knowledge workers to learning measuresfor competence development., , and . MKWI, page 1345-1358. GITO Verlag, (2012)Adaptation Criteria for Preparing Learning Material for Adaptive Usage: Structured Content Analysis of Existing Systems.. USAB, volume 5298 of Lecture Notes in Computer Science, page 411-418. Springer, (2008)Data Anonymization as Instrument to manage Knowledge Risks in Supply Chains., , and . HICSS, page 5503-5512. ScholarSpace, (2024)