Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Alina ChircuUniversity of New MexicoVerified email at unm.edu
Carsten BrockmannUniversity of PotsdamVerified email at wi.uni-potsdam.de
Sourangshu GhoshPh.D. Student, Department of Civil Engineering, Indian Institute of Science BangaloreVerified email at iisc.ac.in
Edzard WeberUniversität PotsdamVerified email at edzardweber.de
André UllrichWeizenbaum InstituteVerified email at weizenbaum-institut.de
Norbert GronauUniversity professor, Business InformaticsVerified email at wi.uni-potsdam.de
Christian KochTechnische Hochschule Nürnberg Georg-Simon-OhmVerified email at th-nuernberg.de
Gergana VladovaHumboldt-Universität zu BerlinVerified email at hu-berlin.de
Malik AmirUniversité de MontréalVerified email at umontreal.ca
Christian BauckhageProf. of Computer Science, University of Bonn, Fraunhofer IAIS, LAMARR InstituteVerified email at bit.uni-bonn.de
Bill BuchananEdinburgh Napier UniversityVerified email at napier.ac.uk
Madjid G. TehraniThe George Washington UniversityVerified email at gwu.edu
Nico PiatkowskiFraunhofer IAISVerified email at iais.fraunhofer.de
Marcus GrumUniversity of PotsdamVerified email at uni-potsdam.de
Mouad LemouddenLecturer at Edinburgh Napier UniversityVerified email at napier.ac.uk
Georg David RitterbuschResearcher at University of PotsdamVerified email at wi.uni-potsdam.de
Malte TeichmannPost Doc am Lehrstuhl für Wirtschaftsinformatik, insb. Prozesse und SystemeVerified email at wi.uni-potsdam.de
Tim MerscheidManager Cybersecurity, ISG (Information Services Group)Verified email at mail.de
Tim KörppenTU MunichVerified email at tum.de
David BaumLeipzig UniversityVerified email at uni-leipzig.de