Author of the publication

Security and compliance challenges in complex IT outsourcing arrangements: A multi-stakeholder perspective.

, , and . Comput. Secur., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracing the Development of Ideas in Distributed, IT-Supported Teams during Synchronous Collaboration., , , and . ECIS, (2014)Effects of interventions into improving knowledge maturing., , and . I-KNOW, page 6. ACM, (2011)Integrating Threat Intelligence to Enhance an Organization's Information Security Management., , , and . ARES, page 37:1-37:8. ACM, (2018)Social Meets Structure: Revealing Team Collaboration Activities and Effects in Enterprise Social Networks., , and . ECIS, (2015)MATURE: Design of Individuation, Interaction and In-Form-ation in Processes of Knowledge Maturing. 13th Conference of SAS-Users in Research and Development 2009, Halle (Saale), Germany, (2009)Institutionalised collaborative tagging as an instrument for managing the maturing learning and knowledge resources, and . International Journal for Technology Enhanced Learning (IJTEL), 1 (1): 70-84 (2008)MATURE: Continuous Social Learning in Knowledge Networks. Invited talk at the ELIG 2010 Annual Meeting: Innovation agenda: Bridging the Gap, September 13-14, 2010, University of Cambridge, Cambridge (UK), (2010)Kollaboratives Tagging zur inhaltlichen Beschreibung von Lern- und Wissensressourcen, and . XML-Tage 2007, Berlin, (2007)Designing Portals for Knowledge Work.. Encyclopedia of Portal Technologies and Applications, IGI Global, (2007)Security Management in Cross-Organizational Settings: A Design Science Approach., , and . ICIS, Association for Information Systems, (2012)