Computerunterstützung für die Gruppenarbeit S Teufel Addison-Wesley, 1995 | 402 | 1995 |
Information security culture: The socio-cultural dimension in information security management T Schlienger, S Teufel Security in the information society: Visions and perspectives, 191-201, 2002 | 312 | 2002 |
Analyzing information security culture: increased trust by an appropriate information security culture T Schlienger, S Teufel 14th International Workshop on Database and Expert Systems Applications …, 2003 | 187 | 2003 |
Tool supported management of information security culture: Application in a private bank T Schlienger, S Teufel Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20 th …, 2005 | 54 | 2005 |
Bridging information technology and business—some modelling aspects S Teufel, B Teufel ACM SIGOIS Bulletin 16 (1), 13-17, 1995 | 47 | 1995 |
The crowd energy concept S Teufel, B Teufel Journal of electronic science and technology 12 (3), 263-269, 2014 | 42 | 2014 |
Social media security culture C Oehri, S Teufel 2012 Information Security for South Africa, 1-5, 2012 | 42 | 2012 |
Computerunterstützte Gruppenarbeit—eine Einführung S Teufel Praxis des Workflow-Managements: Grundlagen, Vorgehen, Beispiele, 35-63, 1996 | 40 | 1996 |
CSCW for strategic management in Swiss enterprises: an empirical study C Sauter, O Morger, T Mühlherr, A Hutchison, S Teufel Proceedings of the Fourth European Conference on Computer-Supported …, 1995 | 35 | 1995 |
Full text retrieval based on syntactic similarities B Teufel, S Schmidt Information Systems 13 (1), 65-70, 1988 | 35 | 1988 |
Security classification for documents JHP Eloff, R Holbein, S Teufel Computers & Security 15 (1), 55-71, 1996 | 33 | 1996 |
Sozio-kulturelle Auswirkungen von Groupware: Ein Ansatz zur Adaption und Operationalisierung eines sozialpsychologischen Modells für die Gestaltung und den Einsatz von Groupware. C Sauter, T Mühlherr, S Teufel ISI, 517-526, 1994 | 28 | 1994 |
The influence of organizational, social and personal factors on cybersecurity awareness and behavior of home computer users J Simonet, S Teufel ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 26 | 2019 |
Future security challenges for smart societies: Overview from technical and societal perspectives M Aldabbas, X Xie, B Teufel, S Teufel 2020 International Conference on Smart Grid and Clean Energy Technologies …, 2020 | 23 | 2020 |
Successful diversification strategies of electricity companies: An explorative empirical study on the success of different diversification strategies of German electricity … R Müller, M Steinert, S Teufel Energy policy 36 (1), 398-412, 2008 | 22 | 2008 |
The use of business process models for security design in organisations R Holbein, S Teufel, K Bauknecht Information systems security: facing the information society of the 21st …, 1996 | 22 | 1996 |
A context authentication service for role based access control in distributed systems-CARDS R Holbein, S Teufel Information Security—the Next Decade: Proceedings of the IFIP TC11 eleventh …, 1995 | 22 | 1995 |
Realization of a context-dependent access control mechanism on a commercial platform U Nitsche, R Holbein, O Morger, S Teufel na, 1998 | 21 | 1998 |
The European mobile data service dilemma: An empirical analysis on the barriers of implementing mobile data services M Steinert, S Teufel Mobile Information Systems II: IFIP International Working Conference on …, 2005 | 19 | 2005 |
Compiladores: conceptos fundamentales B Teufel, S Schmidt, T Teufel, EM Peake Addison-Wesley Iberoamericana, 1995 | 18 | 1995 |