Author of the publication

Vertrauen ist gut, Blockchain ist besser - Einsatzmöglichkeiten von Blockchain für Vertrauensprobleme im Crowdsourcing

, , , , , and . HMD Praxis der Wirtschaftsinformatik, (October 2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting the Human Factor: Social Engineering Attacks on Cryptocurrency Users., , , and . HCI (26), volume 12206 of Lecture Notes in Computer Science, page 650-668. Springer, (2020)Developing a Maturity Model for Information Security Awareness Using a Polytomous Extension of the Rasch Model., , and . HICSS, page 6831-6840. ScholarSpace, (2023)Current Issues Of Metrics For Information Security Awareness., , and . ECIS, (2020)Towards an Information Security Awareness Maturity Model., , , and . HCI (26), volume 12206 of Lecture Notes in Computer Science, page 587-599. Springer, (2020)Utilizing Context Effects of Banner Ads for Conversion Rate Optimization., , , and . HCI (26), volume 12206 of Lecture Notes in Computer Science, page 641-649. Springer, (2020)Analyze Before You Sensitize: Preparation of a Targeted ISA Training., , and . HICSS, page 1-10. ScholarSpace, (2020)Evaluation of a Gamified Elearning Course for Agile Methods., and . EDUCON, page 1-8. IEEE, (2024)The Forgotten Model - Validating the Integrated Behavioral Model in Context of Information Security Awareness., and . HICSS, page 6841-6850. ScholarSpace, (2023)Automated Measuring of Information Security Related Habits., , and . HICSS, page 1-10. ScholarSpace, (2022)360 Degrees of Security: Can VR Increase the Sustainability of ISA Trainings?, , and . HICSS, page 1-10. ScholarSpace, (2022)