Author of the publication

A Blockchain Architecture for Reducing the Bullwhip Effect.

, , and . BMSD, volume 319 of Lecture Notes in Business Information Processing, page 69-82. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Realizing joined-up government - Dynamic capabilities and stage models for transformation., and . Gov. Inf. Q., 26 (2): 275-284 (2009)A Social Cyber Contract Theory Model for Understanding National Cyber Strategies., , and . EGOV, volume 10428 of Lecture Notes in Computer Science, page 166-176. Springer, (2017)Regulatory Compliance and Over-Compliant Information Sharing - Changes in the B2G Landscape., , , and . EGOV, volume 11020 of Lecture Notes in Computer Science, page 249-260. Springer, (2018)Workshop on Open Information Infrastructures Enabling Innovations., , , , , and . EGOV/ePart Ongoing Research, volume P-221 of LNI, page 268-269. GI, (2013)Techno-optimism and policy-pessimism in the public sector big data debate., and . Gov. Inf. Q., (2019)Exploring factors that influence information sharing choices of organizations in networks., , , and . AMCIS, Association for Information Systems, (2015)Enhancing Visibility in International Supply Chains: The Data Pipeline Concept., , , , , , and . Int. J. Electron. Gov. Res., 8 (4): 14-33 (2012)Barriers and impediments to transformational government: insights from literature and practice., , and . Electron. Gov. an Int. J., 8 (2/3): 226-241 (2011)The collaborative realization of public values and business goals: Governance and infrastructure of public-private information platforms., , and . Gov. Inf. Q., 33 (1): 67-79 (2016)Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets., , , , , , , and . USENIX Security Symposium, page 1009-1026. USENIX Association, (2018)