Author of the publication

Technology-Push or Market-pull - What Drives Certification Authorities to Perform continuous Service Certification?

, , and . ECIS, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Cloudy Collaboration in Healthcare: An Evaluation Framework of Cloud Computing Services for Hospitals., , and . HICSS, page 979-988. IEEE Computer Society, (2016)Guidelines for Software Development Effort Estimation., and . IEEE Computer, 44 (10): 88-90 (2011)iRODS metadata management for a cancer genome analysis workflow., , , , , , and . BMC Bioinformatics, 20 (1): 29:1-29:8 (2019)Ünblackboxing" Decision Makers' Interpretations of IS Certifications in the Context of Cloud Service Certifications., , and . J. AIS, 19 (11): 3 (2018)Characteristics of IS Security Approaches with Respect to Healthcare., , , , and . AMCIS, page 609. Association for Information Systems, (2009)From Data to Insights: Leveraging Monitoring Data for Achieving continuous Certification of Cloud Services., , and . ECIS, (2019)Seeing Service Certification "Eye to Eye" - The Role of Perceptual Congruence Between Customers and Providers in IS Certification., , , and . ECIS, page 16. (2018)Gamification in Health Behavior Change Support Systems - A Synthesis of Unintended Side Effects., , , , and . Wirtschaftsinformatik, page 1032-1046. University of Siegen, Germany / AISeL, (2019)No Risk, More Fun! Automating Breach of Confidentiality Risk Assessment for Android Mobile Health Applications., , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2019)Dynamic Certification of Cloud Services: Trust, but Verify!, , , and . IEEE Security & Privacy, 14 (2): 66-71 (2016)