Computerunterstützung für die Gruppenarbeit S Teufel Addison-Wesley, 1995 | 408 | 1995 |
Computerunterstützung für die Gruppenarbeit S Teufel Addison-Wesley, 1995 | 408 | 1995 |
Computerunterstützung für die Gruppenarbeit S Teufel Addison-Wesley, 1995 | 408 | 1995 |
Information security culture-from analysis to change T Schlienger, S Teufel South African Computer Journal 2003 (31), 46-52, 2003 | 324* | 2003 |
Information security culture-from analysis to change T Schlienger, S Teufel South African Computer Journal 2003 (31), 46-52, 2003 | 205 | 2003 |
Analyzing information security culture: increased trust by an appropriate information security culture T Schlienger, S Teufel 14th International Workshop on Database and Expert Systems Applications …, 2003 | 186 | 2003 |
Tool supported management of information security culture: Application in a private bank T Schlienger, S Teufel Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20 th …, 2005 | 54 | 2005 |
Bridging information technology and business—some modelling aspects S Teufel, B Teufel ACM SIGOIS Bulletin 16 (1), 13-17, 1995 | 46 | 1995 |
Computerunterstützte Gruppenarbeit—eine Einführung S Teufel Praxis des Workflow-Managements: Grundlagen, Vorgehen, Beispiele, 35-63, 1996 | 42 | 1996 |
The crowd energy concept S Teufel, B Teufel Journal of electronic science and technology 12 (3), 263-269, 2014 | 41 | 2014 |
Social media security culture C Oehri, S Teufel 2012 Information Security for South Africa, 1-5, 2012 | 40 | 2012 |
Full text retrieval based on syntactic similarities B Teufel, S Schmidt Information Systems 13 (1), 65-70, 1988 | 36 | 1988 |
CSCW for strategic management in Swiss enterprises: an empirical study C Sauter, O Morger, T Mühlherr, A Hutchison, S Teufel Proceedings of the Fourth European Conference on Computer-Supported …, 1995 | 34 | 1995 |
Security classification for documents JHP Eloff, R Holbein, S Teufel Computers & Security 15 (1), 55-71, 1996 | 33 | 1996 |
Sozio-kulturelle Auswirkungen von Groupware: Ein Ansatz zur Adaption und Operationalisierung eines sozialpsychologischen Modells für die Gestaltung und den Einsatz von Groupware. C Sauter, T Mühlherr, S Teufel ISI, 517-526, 1994 | 27 | 1994 |
The influence of organizational, social and personal factors on cybersecurity awareness and behavior of home computer users J Simonet, S Teufel ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 22 | 2019 |
Successful diversification strategies of electricity companies: An explorative empirical study on the success of different diversification strategies of German electricity … R Müller, M Steinert, S Teufel Energy policy 36 (1), 398-412, 2008 | 22 | 2008 |
The use of business process models for security design in organisations R Holbein, S Teufel, K Bauknecht Information systems security: facing the information society of the 21st …, 1996 | 22 | 1996 |
A context authentication service for role based access control in distributed systems-CARDS R Holbein, S Teufel Information Security—the Next Decade: Proceedings of the IFIP TC11 eleventh …, 1995 | 22 | 1995 |
Realization of a context-dependent access control mechanism on a commercial platform U Nitsche, R Holbein, O Morger, S Teufel na, 1998 | 21 | 1998 |