Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Meets Structure: Revealing Team Collaboration Activities and Effects in Enterprise Social Networks., , and . ECIS, (2015)Integrating Threat Intelligence to Enhance an Organization's Information Security Management., , , and . ARES, page 37:1-37:8. ACM, (2018)Effects of interventions into improving knowledge maturing., , and . I-KNOW, page 6. ACM, (2011)Exploring Idea Quality Evolution During Convergence., , , , and . ICIS, Association for Information Systems, (2015)Designing a Digital Nudge for Convergence: The Role of Decomposition of Information Load for Decision Making and Choice Accuracy., , and . AIS Trans. Hum. Comput. Interact., 11 (3): 5 (2019)Profiles for Convenient Front-end Privacy., and . SEKE, page 125-130. Knowledge Systems Institute Graduate School, (2013)Capturing Practices of Knowledge Work for Information Systems Design., , , and . ECIS, page 7. (2010)Organisational Learning from the Perspective of Knowledge Maturing Activities, , , , , , , , , and 1 other author(s). IEEE Transactions on Learning Technologies, 6 (2): 158-176 (2013)Security Management in Cross-Organizational Settings: A Design Science Approach., , and . ICIS, Association for Information Systems, (2012)Designing Portals for Knowledge Work.. Encyclopedia of Portal Technologies and Applications, IGI Global, (2007)