Author of the publication

How Security Problems can Compromise Remote Internet Voting Systems.

. Electronic Voting in Europe, volume P-47 of LNI, page 121-131. GI, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing datacenter energy usage through efficient job allocation., , and . ECIS, page 108. (2011)Preserving Knowledge on IS Business Value - What Literature Reviews Have Done.. Business & Information Systems Engineering, 2 (4): 233-244 (2010)Komponentenorientierte Softwareentwicklung in Softwareunternehmen. DUV Dt. Univ.-Verl., Wiesbaden, 1. Aufl edition, (2001)Internet-Wahlen.. Wirtschaftsinformatik (1), page 939-956. Physica-Verlag, (2003)IS Design Thinking in Disaster Management Research., and . HICSS, page 4102-4111. IEEE Computer Society, (2012)Fighting spam: motivating an account-based approach.. ICWI, page 937-940. IADIS, (2004)Factors Affecting the Scientific Impact of Literature Reviews: A Scientometric Study., , , , and . ICIS, Association for Information Systems, (2016)Is open source security a myth?. Commun. ACM, 54 (5): 130--140 (May 2011)An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness.. SCIS, volume 60 of Lecture Notes in Business Information Processing, page 139-155. Springer, (2010)Classifying the Ideational Impact of IS Review Articles: A Natural Language Processing Based Approach., , and . ICIS, Association for Information Systems, (2018)