Author of the publication

From Business Value Model to Coordination Process Model.

, , and . IWEI, volume 38 of Lecture Notes in Business Information Processing, page 94-106. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

06351 Abstracts Collection -- Methods for Modelling Software Systems (MMOSS)., , , , and . MMOSS, volume 06351 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2006)A Study on Tangible Participative Enterprise Modelling., , , and . ER Workshops, volume 9975 of Lecture Notes in Computer Science, page 139-148. (2016)Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group., , , and . ER, volume 9381 of Lecture Notes in Computer Science, page 558-565. Springer, (2015)Towards More Individualized Interfaces: Automating the Assessment of Computer Literacy., , and . BCSS@PERSUASIVE, volume 2340 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Cross-Organizational Workflows: A Classification of Design Decisions., , , and . CAiSE Short Paper Proceedings, volume 161 of CEUR Workshop Proceedings, CEUR-WS.org, (2005)Semantic and Pragmatic Interoperability: A Model for Understanding., , , and . EMOI-INTEROP, volume 160 of CEUR Workshop Proceedings, CEUR-WS.org, (2005)Towards Security Requirements: Iconicity as a Feature of an Informal Modeling Language., , , , and . REFSQ Workshops, volume 1796 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Experiment: Understandability of Goal Modeling with ARMOR., and . REFSQ Workshops, volume 1138 of CEUR Workshop Proceedings, page 76-81. CEUR-WS.org, (2014)Surveying the factors that influence maintainability: research design., and . ESEC/SIGSOFT FSE, page 385-388. ACM, (2005)Risk and Business Goal Based Security Requirement and Countermeasure Prioritization., , , and . BIR Workshops, volume 106 of Lecture Notes in Business Information Processing, page 64-76. Springer, (2011)