Author of the publication

Challenges in Cross-Organizational Security Management.

, , , and . HICSS, page 5480-5489. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.


Other publications of authors with the same name

Show Me What You Do and I Will Tell You Who You Are: A Cluster Typology of Supply Chain Risk Management in SMEs., , and . J. Theor. Appl. Electron. Commer. Res., 17 (1): 345-359 (2022)Explainability and the Intention to Use AI-based Conversational Agents (Short Paper)., , and . XI-ML@KI, volume 2796 of CEUR Workshop Proceedings,, (2020)Analytics for Everyday Learning from two Perspectives: Knowledge Workers and Teachers., , , , , and . AFEL@EC-TEL, volume 2209 of CEUR Workshop Proceedings,, (2018)Reflections on the Workshop., and . AFEL@EC-TEL, volume 2209 of CEUR Workshop Proceedings,, (2018)Improving Search Strategies of Auditors - A Focus Group on Reflection Interventions., , , and . ARTEL@EC-TEL, volume 1997 of CEUR Workshop Proceedings,, (2017)Knowledge Risks in Digital Supply Chains: A Literature Review., and . Wirtschaftsinformatik (Zentrale Tracks), page 370-385. GITO Verlag, (2020)Adaptation Criteria for Preparing Learning Material for Adaptive Usage: Structured Content Analysis of Existing Systems.. USAB, volume 5298 of Lecture Notes in Computer Science, page 411-418. Springer, (2008)The Ends of Knowledge Sharing in Networks: Using Information Technology to Start Knowledge Protection., , and . ECIS, (2015)Decision support for multi-component systems: visualizing interdependencies for predictive maintenance., , , and . HICSS, page 1-10. ScholarSpace, (2022)Data Anonymization as Instrument to manage Knowledge Risks in Supply Chains., , and . HICSS, page 5503-5512. ScholarSpace, (2024)