Author of the publication

Integrating Threat Intelligence to Enhance an Organization's Information Security Management.

, , , and . ARES, page 37:1-37:8. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profiles for Convenient Front-end Privacy., and . SEKE, page 125-130. Knowledge Systems Institute Graduate School, (2013)Effects of interventions into improving knowledge maturing., , and . I-KNOW, page 6. ACM, (2011)Integrating Threat Intelligence to Enhance an Organization's Information Security Management., , , and . ARES, page 37:1-37:8. ACM, (2018)Exploring Idea Quality Evolution During Convergence., , , , and . ICIS, Association for Information Systems, (2015)Capturing Practices of Knowledge Work for Information Systems Design., , , and . ECIS, page 7. (2010)Security Management in Cross-Organizational Settings: A Design Science Approach., , and . ICIS, Association for Information Systems, (2012)Social Meets Structure: Revealing Team Collaboration Activities and Effects in Enterprise Social Networks., , and . ECIS, (2015)Convergence on Self-Generated vs. Crowdsourced Ideas in Crisis Response: Comparing Social Exchange Processes and Satisfaction with Process., , , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Human-Robot Interaction: Mapping Literature Review and Network Analysis., , and . HICSS, page 481-490. ScholarSpace, (2023)Exploring Idea Convergence and Conceptual Combination in Open Innovative Crowdsourcing from a Cognitive Load Perspective., , , , , , and . HICSS, page 1-10. ScholarSpace, (2019)