Author of the publication

Augmenting Frontline Service Employee Onboarding via Hybrid Intelligence: Examining the Effects of Different Degrees of Human-GenAI Interaction

, , , , , , , , and . International Conference on Design Science Research in Information Systems and Technology (DESRIST 2024), Trollhättan, Sweden, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Secure Coding Challenges for Cybersecurity Education in the Industry., , , and . QUATIC, volume 1266 of Communications in Computer and Information Science, page 223-237. Springer, (2020)Digital Sovereignty from the Perspective of IT Consultancy in Germany: A Model., and . ICSOB Companion, volume 3621 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Risk Factors for Malicious Insider Threats - An Analysis of Attack Scenarios., , , and . AMCIS, Association for Information Systems, (2023)Cloud of Assets and Threats: A Playful Method to Raise Awareness for Cloud Security in Industry., , , and . ICPEC, volume 102 of OASIcs, page 6:1-6:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Concept into Architecture (CiA) - Integration von Expertenwissen im Rahmen einer automatisierten Erstellung operationeller NAF-Architekturen., , and . Wirtschaftsinformatik, page 30. AISeL, (2023)Is Secure Coding Education in the Industry Needed? An Investigation Through a Large Scale Survey., , , and . ICSE (SEET), page 241-252. IEEE, (2021)A Blockchain to Bridge Business Information Systems and Industrial Automation Environments in Supply Chains., , and . I4CS, volume 1404 of Communications in Computer and Information Science, page 22-40. Springer, (2021)A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments., , , , and . UbiSec, volume 1557 of Communications in Computer and Information Science, page 171-188. Springer, (2021)Communication content relations to coordination and trust over time: a computer game perspective., and . C&T, page 60-68. ACM, (2011)Raising Awareness about Cloud Security in Industry through a Board Game., , , and . Inf., 12 (11): 482 (2021)