Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Data-Driven Business Value Matrix - A Classification Scheme for Data-Driven Business Models., , , , and . Bled eConference, page 19. University of Maribor Press / Association for Information Systems, (2019)A Reflective Quiz in a Professional Qualification Program for Stroke Nurses: A Field Trial., , and . EC-TEL, volume 9891 of Lecture Notes in Computer Science, page 583-586. Springer, (2016)A Network-based Tool for Identifying Knowledge Risks in Data-Driven Business Models., , and . HICSS, page 1-10. ScholarSpace, (2021)Finding traces of self-regulated learning in activity streams., , , , , , and . LAK, page 191-200. ACM, (2018)The Reflection Object: An Activity-Theory Informed Concept for Designing for Reflection., and . Interact. Comput., 33 (3): 295-310 (2021)Rebo at Work: Reflecting on Working, Learning, and Learning Goals with the Reflection Guidance Chatbot for Apprentices., , , and . CHI Extended Abstracts, page 244:1-244:7. ACM, (2023)Virtualizing face-2-face trainings for training senior professionals: a comparative case study on financial auditors., , , and . L@S, page 37:1-37:4. ACM, (2018)Where am I? Using Mobile Sensor Data to Predict a User's Semantic Place with a Random Forest Algorithm., , , and . MobiQuitous, volume 120 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 64-75. Springer, (2012)Pre-attentive Features in Natural Augmented Reality Visualizations., , and . ISMAR Adjunct, page 72-73. IEEE Computer Society, (2016)Collaborating in a Research and Development Project: Knowledge Protection Practices applied in a Co-opetitive Setting., , , and . WM, volume P-303 of LNI, page 172-187. Gesellschaft für Informatik e.V., (2019)