Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RFID data sharing in supply chains: What is the value of the EPC network?, and . IJEB, 7 (1): 21-43 (2009)Resolving the Misalignment between Consumer Privacy Concerns and Ubiquitous IS Design: The Case of Usage-based Insurance., , and . ICIS, Association for Information Systems, (2012)Pushing the limits of RFID: Empowering RFID-based Electronic Article Surveillance with Data Analytics Techniques., , , and . ICIS, Association for Information Systems, (2015)Assessing the Impact of Privacy-Enhancing Technologies for RFID in the Retail Industry., , and . AMCIS, page 223. Association for Information Systems, (2007)Patterns of Remixes or Where Do Innovations Come from: Evidence from 3D Printing., , , and . ECIS, (2015)The Adoption of RFID-based Self-Check-Out-Systems at the Point-of-Sale., , , and . I3E, volume 226 of IFIP, page 153-165. Springer, (2006)Constant Data Length Retrieval for Video Servers with Variable Bit Rate Streams., , and . ICMCS, page 151-155. IEEE Computer Society, (1996)RFID-Based Facility Maintenance at Frankfurt Airport., and . IEEE Pervasive Computing, 5 (1): 34-39 (2006)Identifying the Skills Expected of IS Graduates by Industry: A Text Mining Approach., , and . ICIS, Association for Information Systems, (2018)Decreasing false-positive RFID tag reads by improved portal antenna setups., , , and . IOT, page 99-106. IEEE, (2012)