Author of the publication

Challenges in Cross-Organizational Security Management.

, , , and . HICSS, page 5480-5489. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Management in Cross-Organizational Settings: A Design Science Approach., , and . ICIS, Association for Information Systems, (2012)Institutionalised collaborative tagging as an instrument for managing the maturing learning and knowledge resources, and . International Journal for Technology Enhanced Learning (IJTEL), 1 (1): 70-84 (2008)Kollaboratives Tagging zur inhaltlichen Beschreibung von Lern- und Wissensressourcen, and . XML-Tage 2007, Berlin, (2007)Toward a Visual Analytics Framework for Learning Communities in Industry 4.0., , and . WM, volume 1821 of CEUR Workshop Proceedings, page 129-130. CEUR-WS.org, (2017)Capturing Practices of Knowledge Work for Information Systems Design., , , and . ECIS, page 7. (2010)A Network-based Tool for Identifying Knowledge Risks in Data-Driven Business Models., , and . HICSS, page 1-10. ScholarSpace, (2021)Managing and facilitating knowledge creation in collaborative settings., and . MKWI, page 1331-1344. GITO Verlag, (2012)Optimising allocation of knowledge workers to learning measuresfor competence development., , and . MKWI, page 1345-1358. GITO Verlag, (2012)The Ends of Knowledge Sharing in Networks: Using Information Technology to Start Knowledge Protection., , and . ECIS, (2015)Adaptation Criteria for Preparing Learning Material for Adaptive Usage: Structured Content Analysis of Existing Systems.. USAB, volume 5298 of Lecture Notes in Computer Science, page 411-418. Springer, (2008)