27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Maria Semmelrock-Picej et al.<br />

Fuchs, L. and Pernul, G. (2007) “Supporting Compliant and Secure User Handling – A Structured Approach for<br />

In-House Identity Management”, The Second International <strong>Conference</strong> on Availability, Reliability and<br />

Security (ARES 2007), IEEE Society, Los Alamitos, pp 374–384.<br />

Jackson, G. (2010) “Identity and Access Management”, [online], The University of Chicago, Overview paper,<br />

www.internet2.edu/pubs/200703-ISMW.pdf.<br />

Josang, A., Ismail, R. and Boyd, D. (2007) “A survey of trust and reputation systems for online service provision”,<br />

Decision Support Systems, Vol 43, No. 2, pp 618-644.<br />

Klein, R., Rai, A. and Straub, D.W. (2007) “Competitive and cooperative positioning in supply chain logistics<br />

relationship”, Decision Sciences, Vol 38, No. 4, pp 611-646.<br />

Lipnack, J. and Stamps, J. (1994) The age of the Network – Organizing principles for the 21 st Century, John<br />

Wiley & Sons.<br />

Lipnack, J. and Stamps, J. (1997) Virtual Teams – Reaching across space, time and organizations with<br />

technology, John Wiley & Sons.<br />

Matsuo, Y. and Yamamoto, H. (2009) “Community gravity: Measuring bidirectional effects by trust and rating on<br />

online social network”, International World Wide Web <strong>Conference</strong> (WWW), pp 751-760.<br />

Mohrman, S. A., Finegold, D. and Mohrman, A. M. (2003) “An empirical model of the organization knowledge<br />

system in new product development firms”, Journal of Engineering Technology Management, Vol 20, No. 1,<br />

pp 7-38.<br />

Mori, J., Sugiyaman, T. and Matsuo, Y. (2005) “Real-world oriented information sharing using social networks”,<br />

Group, pp 81-85.<br />

Mui, L., Mohtashemi, M. and Halberstadt, A. (2002) “A computational model of trust and reputation for e-<br />

Business”, Hawaii International <strong>Conference</strong>s on Systems Sciences (HICSS), p.188.<br />

Obiltschnig, A. (2007) Role-based Provisioning - Ein praktischer Ansatz im Identity Manage-ment, Institute for<br />

Applied Computer Science, Faculty for Technical Sciences, University of Klagenfurt, Klagenfurt.<br />

Schmelmer M. (2008) “Infineon setzt bei IT auf Einsparungen”, [online],<br />

www.cio.de/strategien/methoden/850789/index.html.<br />

Semmelrock-Picej, M.Th. and Possegger, A. (2010) “Ausgewählte Sicherheitsrelevante Aspekte der<br />

eCollaboration”, D-A-CH Security 2010, pp 314-325.<br />

Skyrme, D. (2007) „Insights“, [online], www.skyrme.com/insights/.<br />

Zack, M.M. (1999) “Managing codified knowledge”, Sloan Management Review, Vol 40, No. 4, pp 45-58.<br />

Ziener, K. (2010) Grenzüberschreitende Wirtschaftskooperationen und Interreg III A Projekte, Klagenfurt 2010.<br />

251

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!