Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characteristics of IS Security Approaches with Respect to Healthcare., , , , and . AMCIS, page 609. Association for Information Systems, (2009)Information Security of Patient-Centred Services Utilising the German Nationwide Health Information Technology Infrastructure., and . HealthSec, USENIX Association, (2012)Moving in the Right Direction?: Mapping literature on Cloud Service Certifications' Outcomes with Practitioners' Perceptions., , and . ECIS, (2014)Risikosteuerung bei der Anpassung von Behandlungsabläufen für die elektronische Gesundheitskarte., , , and . Wirtschaftsinformatik, page 79. (2011)Comparative Evaluation of Google Health API vs. Microsoft HealthVault API., , and . HEALTHINF, page 195-201. INSTICC Press, (2010)From Medical Processes to Workflows - Modeling of Clinical Pathways with the Unified Modeling Language., , , , and . HEALTHINF, page 388-391. INSTICC Press, (2010)Ünblackboxing" Decision Makers' Interpretations of IS Certifications in the Context of Cloud Service Certifications., , and . J. AIS, 19 (11): 3 (2018)Dynamic Certification of Cloud Services: Trust, but Verify!, , , and . IEEE Security & Privacy, 14 (2): 66-71 (2016)Exploring Cloudy Collaboration in Healthcare: An Evaluation Framework of Cloud Computing Services for Hospitals., , and . HICSS, page 979-988. IEEE Computer Society, (2016)iRODS metadata management for a cancer genome analysis workflow., , , , , , and . BMC Bioinformatics, 20 (1): 29:1-29:8 (2019)