Author of the publication

Self-Sovereign Identity and Verifiable Credentials in Your Digital Wallet.

, and . MIS Q. Executive, 21 (3): 6 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IT outsourcing in insurance services: risk, creative contracting and business advantage., and . Inf. Syst. J., 9 (3): 163-180 (1999)IT outsoursing in Europe and the USA: Assessment issues., , and . ECIS, page 247-260. (1995)What's Next in Blockchain Research?: - An Identification of Key Topics Using a Multidisciplinary Perspective., , , , , and . Data Base, 52 (1): 27-52 (2021)Information Technology Sourcing Research: Critique, Lessons and Prospects., , and . AMCIS, page 359. Association for Information Systems, (2007)Sourcing Information Technology Services., and . Computing Handbook, 3rd ed. (2), CRC Press, (2014)The rhetoric, reality, and future of the relationship dimension in information technology outsourcing (panel session)., , , and . ICIS, page 525. Association for Information Systems, (1997)Addressing Key Challenges to Making Enterprise Blockchain Applications a Reality.. MIS Q. Executive, 17 (3): 3 (2018)Provider's Innovativeness and Outsourcing Performance: the Moderating effects of Contractual and Relational Governace., , and . PACIS, page 140. (2016)Nine Practices for Best-in-Class BPO Performance., and . MIS Q. Executive, 13 (3): 5 (2014)Robotic Process Automation at Telefónica O2., and . MIS Q. Executive, 15 (1): 4 (2016)