Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives., , , and . Wirtschaftsinformatik, (2017)Laying the foundation for smart contract development: an integrated engineering process model., , , , and . Inf. Syst. E Bus. Manag., 19 (3): 863-882 (2021)Experience: Data and Information Quality Challenges in Governance, Risk, and Compliance Management., , and . ACM J. Data Inf. Qual., 11 (2): 6:1-6:14 (2019)Using Business Process Model Awareness to improve Stakeholder Participation in Information Systems Security Risk Management Processes., and . Wirtschaftsinformatik, page 1177-1190. (2015)Using Stakeholder Knowledge for Data Quality Assessment in IS Security Risk Management Processes., and . CPR, page 153-159. ACM, (2015)Identifying Blind Spots in IS Security Risk Management Processes Using Qualitative Model Analysis., and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 252-259. Springer, (2015)Security im Produkt-Lifecycle -- Lästige Pflicht oder Chance?, , and . Informatik-Spektrum, 39 (5): 353--361 (October 2016)Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice., , , and . WISCS@CCS, page 65-70. ACM, (2016)The Impact of Knowledge Sharing Platforms in Distributed Requirements Engineering Scenarios: A Systematic Review., and . KMO, page 579-591. Springer, (2013)The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter., , , , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 201-215. Springer, (2018)