Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantische Modellierungstechniken für multidimensionale Datenstrukturen., and . HMD - Praxis Wirtschaftsinform., (1997)Kosten und Nutzen von IT-Sicherheit.. Wirtschaftsinformatik, 48 (6): 456 (2006)IT-Sicherheit.. Wirtschaftsinformatik, 48 (6): 456 (2006)WI - Literatur., , , , , , , , , and . Wirtschaftsinformatik, 46 (6): 481-487 (2004)E-learning Engineering: Recommendations for Consumer-Driven Blended Learning., , and . EDUTECH, volume 151 of IFIP, page 187-196. Kluwer/Springer, (2004)Mass Customization und Serviceplattformstrategien im Blended Learning Engineering - konzeptionelle Grundlagen und evaluationsgestützte Erfahrungen., , and . Wirtschaftsinformatik (2), page 3-20. Universitaetsverlag Karlsruhe, (2007)Analyzing Malware Log Data to Support Security Information and Event Management: Some Research Results., , , and . DBKDA, page 108-113. IEEE Computer Society, (2009)BORIS - Business-Oriented Management of Information Security., , and . WEIS, (2008)Multidimensional Management of Information Security - A Metrics Based Approach Merging Business and Information Security Topics., and . ARES, page 750-755. IEEE Computer Society, (2009)Organisatorische Gestaltungspotenziale durch Electronic Government.. Wirtschaftsinformatik, 49 (3): 227-228 (2007)