Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Show Me What You Do and I Will Tell You Who You Are: A Cluster Typology of Supply Chain Risk Management in SMEs., , and . J. Theor. Appl. Electron. Commer. Res., 17 (1): 345-359 (2022)Improving Search Strategies of Auditors - A Focus Group on Reflection Interventions., , , and . ARTEL@EC-TEL, volume 1997 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Analytics for Everyday Learning from two Perspectives: Knowledge Workers and Teachers., , , , , and . AFEL@EC-TEL, volume 2209 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Reflections on the Workshop., and . AFEL@EC-TEL, volume 2209 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Decision support for multi-component systems: visualizing interdependencies for predictive maintenance., , , and . HICSS, page 1-10. ScholarSpace, (2022)Data Anonymization as Instrument to manage Knowledge Risks in Supply Chains., , and . HICSS, page 5503-5512. ScholarSpace, (2024)Explainability and the Intention to Use AI-based Conversational Agents (Short Paper)., , and . XI-ML@KI, volume 2796 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)Knowledge Risks in Digital Supply Chains: A Literature Review., and . Wirtschaftsinformatik (Zentrale Tracks), page 370-385. GITO Verlag, (2020)Enhanced Active Learning of Convolutional Neural Networks: A Case Study for Defect Classification in the Semiconductor Industry., , , , , and . KDIR, page 269-276. SCITEPRESS, (2020)The Ends of Knowledge Sharing in Networks: Using Information Technology to Start Knowledge Protection., , and . ECIS, (2015)