[{"language":[{"iso":"eng"}],"_id":"5445","department":[{"_id":"274"}],"user_id":"46632","status":"public","publication":"Journal of Business Economics.","type":"journal_article","title":"Individual-Level Experience and Organizational-Level Absorptive Capacity: The Special Case of International New Ventures.","date_updated":"2022-01-06T07:01:54Z","date_created":"2018-11-08T13:04:37Z","author":[{"last_name":"Wehner","full_name":"Wehner, M C","first_name":"M C"},{"first_name":"C","full_name":"Schwens, C","last_name":"Schwens"},{"first_name":"Rüdiger","last_name":"Kabst","id":"42362","full_name":"Kabst, Rüdiger"}],"year":"2015","citation":{"apa":"Wehner, M. C., Schwens, C., &#38; Kabst, R. (2015). Individual-Level Experience and Organizational-Level Absorptive Capacity: The Special Case of International New Ventures. <i>Journal of Business Economics.</i>","bibtex":"@article{Wehner_Schwens_Kabst_2015, title={Individual-Level Experience and Organizational-Level Absorptive Capacity: The Special Case of International New Ventures.}, journal={Journal of Business Economics.}, author={Wehner, M C and Schwens, C and Kabst, Rüdiger}, year={2015} }","short":"M.C. Wehner, C. Schwens, R. Kabst, Journal of Business Economics. (2015).","mla":"Wehner, M. C., et al. “Individual-Level Experience and Organizational-Level Absorptive Capacity: The Special Case of International New Ventures.” <i>Journal of Business Economics.</i>, 2015.","ama":"Wehner MC, Schwens C, Kabst R. Individual-Level Experience and Organizational-Level Absorptive Capacity: The Special Case of International New Ventures. <i>Journal of Business Economics</i>. 2015.","ieee":"M. C. Wehner, C. Schwens, and R. Kabst, “Individual-Level Experience and Organizational-Level Absorptive Capacity: The Special Case of International New Ventures.,” <i>Journal of Business Economics.</i>, 2015.","chicago":"Wehner, M C, C Schwens, and Rüdiger Kabst. “Individual-Level Experience and Organizational-Level Absorptive Capacity: The Special Case of International New Ventures.” <i>Journal of Business Economics.</i>, 2015."}},{"publication":"International Business Review.","type":"journal_article","status":"public","department":[{"_id":"274"}],"user_id":"46632","_id":"5449","language":[{"iso":"eng"}],"citation":{"ama":"Hütt P, Baum M, Schwens C, Kabst R. Foreign Direct Investment Location Choice of Small- and Medium-Sized Enterprises: The Risk of Value Erosion of Firm-Specific Resources. <i>International Business Review</i>. 2015.","chicago":"Hütt, P, M Baum, C Schwens, and Rüdiger Kabst. “Foreign Direct Investment Location Choice of Small- and Medium-Sized Enterprises: The Risk of Value Erosion of Firm-Specific Resources.” <i>International Business Review.</i>, 2015.","ieee":"P. Hütt, M. Baum, C. Schwens, and R. Kabst, “Foreign Direct Investment Location Choice of Small- and Medium-Sized Enterprises: The Risk of Value Erosion of Firm-Specific Resources.,” <i>International Business Review.</i>, 2015.","apa":"Hütt, P., Baum, M., Schwens, C., &#38; Kabst, R. (2015). Foreign Direct Investment Location Choice of Small- and Medium-Sized Enterprises: The Risk of Value Erosion of Firm-Specific Resources. <i>International Business Review.</i>","short":"P. Hütt, M. Baum, C. Schwens, R. Kabst, International Business Review. (2015).","mla":"Hütt, P., et al. “Foreign Direct Investment Location Choice of Small- and Medium-Sized Enterprises: The Risk of Value Erosion of Firm-Specific Resources.” <i>International Business Review.</i>, 2015.","bibtex":"@article{Hütt_Baum_Schwens_Kabst_2015, title={Foreign Direct Investment Location Choice of Small- and Medium-Sized Enterprises: The Risk of Value Erosion of Firm-Specific Resources.}, journal={International Business Review.}, author={Hütt, P and Baum, M and Schwens, C and Kabst, Rüdiger}, year={2015} }"},"year":"2015","author":[{"first_name":"P","full_name":"Hütt, P","last_name":"Hütt"},{"first_name":"M","full_name":"Baum, M","last_name":"Baum"},{"first_name":"C","last_name":"Schwens","full_name":"Schwens, C"},{"full_name":"Kabst, Rüdiger","id":"42362","last_name":"Kabst","first_name":"Rüdiger"}],"date_created":"2018-11-08T13:12:41Z","date_updated":"2022-01-06T07:01:54Z","title":"Foreign Direct Investment Location Choice of Small- and Medium-Sized Enterprises: The Risk of Value Erosion of Firm-Specific Resources."},{"date_updated":"2022-01-06T07:01:54Z","date_created":"2018-11-08T13:22:19Z","author":[{"first_name":"S","full_name":"Wolf, S","last_name":"Wolf"},{"last_name":"Weißenberger","full_name":"Weißenberger, B E","first_name":"B E"},{"first_name":"M C","full_name":"Wehner, M C","last_name":"Wehner"},{"last_name":"Kabst","id":"42362","full_name":"Kabst, Rüdiger","first_name":"Rüdiger"}],"title":"Controllers as Business Partners in Managerial Decision-Making: Attitude, Subjective Norm, and Internal Improvements.","year":"2015","citation":{"short":"S. Wolf, B.E. Weißenberger, M.C. Wehner, R. Kabst, Journal of Accounting &#38; Organizational Change. (2015).","mla":"Wolf, S., et al. “Controllers as Business Partners in Managerial Decision-Making: Attitude, Subjective Norm, and Internal Improvements.” <i>Journal of Accounting &#38; Organizational Change.</i>, 2015.","bibtex":"@article{Wolf_Weißenberger_Wehner_Kabst_2015, title={Controllers as Business Partners in Managerial Decision-Making: Attitude, Subjective Norm, and Internal Improvements.}, journal={Journal of Accounting &#38; Organizational Change.}, author={Wolf, S and Weißenberger, B E and Wehner, M C and Kabst, Rüdiger}, year={2015} }","apa":"Wolf, S., Weißenberger, B. E., Wehner, M. C., &#38; Kabst, R. (2015). Controllers as Business Partners in Managerial Decision-Making: Attitude, Subjective Norm, and Internal Improvements. <i>Journal of Accounting &#38; Organizational Change.</i>","ama":"Wolf S, Weißenberger BE, Wehner MC, Kabst R. Controllers as Business Partners in Managerial Decision-Making: Attitude, Subjective Norm, and Internal Improvements. <i>Journal of Accounting &#38; Organizational Change</i>. 2015.","ieee":"S. Wolf, B. E. Weißenberger, M. C. Wehner, and R. Kabst, “Controllers as Business Partners in Managerial Decision-Making: Attitude, Subjective Norm, and Internal Improvements.,” <i>Journal of Accounting &#38; Organizational Change.</i>, 2015.","chicago":"Wolf, S, B E Weißenberger, M C Wehner, and Rüdiger Kabst. “Controllers as Business Partners in Managerial Decision-Making: Attitude, Subjective Norm, and Internal Improvements.” <i>Journal of Accounting &#38; Organizational Change.</i>, 2015."},"_id":"5451","department":[{"_id":"274"}],"user_id":"46632","language":[{"iso":"eng"}],"publication":"Journal of Accounting & Organizational Change.","type":"journal_article","status":"public"},{"year":"2015","citation":{"ieee":"R. Isidor, C. Schwens, and R. Kabst, “ Interim Management Utilization, Firm Flexibility and its Impact on Firm Performance.,” <i>International Journal of Human Resources Development and Management. </i>, 2015.","chicago":"Isidor, R, C Schwens, and Rüdiger Kabst. “ Interim Management Utilization, Firm Flexibility and Its Impact on Firm Performance.” <i>International Journal of Human Resources Development and Management. </i>, 2015.","ama":"Isidor R, Schwens C, Kabst R.  Interim Management Utilization, Firm Flexibility and its Impact on Firm Performance. <i>International Journal of Human Resources Development and Management </i>. 2015.","apa":"Isidor, R., Schwens, C., &#38; Kabst, R. (2015).  Interim Management Utilization, Firm Flexibility and its Impact on Firm Performance. <i>International Journal of Human Resources Development and Management. </i>.","mla":"Isidor, R., et al. “ Interim Management Utilization, Firm Flexibility and Its Impact on Firm Performance.” <i>International Journal of Human Resources Development and Management. </i>, 2015.","bibtex":"@article{Isidor_Schwens_Kabst_2015, title={ Interim Management Utilization, Firm Flexibility and its Impact on Firm Performance.}, journal={International Journal of Human Resources Development and Management. }, author={Isidor, R and Schwens, C and Kabst, Rüdiger}, year={2015} }","short":"R. Isidor, C. Schwens, R. Kabst, International Journal of Human Resources Development and Management.  (2015)."},"title":" Interim Management Utilization, Firm Flexibility and its Impact on Firm Performance.","date_updated":"2022-01-06T07:01:54Z","author":[{"full_name":"Isidor, R","last_name":"Isidor","first_name":"R"},{"last_name":"Schwens","full_name":"Schwens, C","first_name":"C"},{"last_name":"Kabst","id":"42362","full_name":"Kabst, Rüdiger","first_name":"Rüdiger"}],"date_created":"2018-11-08T13:24:56Z","status":"public","publication":"International Journal of Human Resources Development and Management. ","type":"journal_article","language":[{"iso":"eng"}],"_id":"5452","department":[{"_id":"274"}],"user_id":"46632"},{"status":"public","publication":"Human Resource Management. ","type":"journal_article","language":[{"iso":"eng"}],"_id":"5454","department":[{"_id":"274"}],"user_id":"46632","year":"2015","citation":{"ama":"Baum M, Schäfer M, Kabst R. Modeling the Impact of Advertisement-Image Congruity on Applicant Attraction. <i>Human Resource Management </i>. 2015.","chicago":"Baum, M, M Schäfer, and Rüdiger Kabst. “Modeling the Impact of Advertisement-Image Congruity on Applicant Attraction.” <i>Human Resource Management. </i>, 2015.","ieee":"M. Baum, M. Schäfer, and R. Kabst, “Modeling the Impact of Advertisement-Image Congruity on Applicant Attraction.,” <i>Human Resource Management. </i>, 2015.","bibtex":"@article{Baum_Schäfer_Kabst_2015, title={Modeling the Impact of Advertisement-Image Congruity on Applicant Attraction.}, journal={Human Resource Management. }, author={Baum, M and Schäfer, M and Kabst, Rüdiger}, year={2015} }","short":"M. Baum, M. Schäfer, R. Kabst, Human Resource Management.  (2015).","mla":"Baum, M., et al. “Modeling the Impact of Advertisement-Image Congruity on Applicant Attraction.” <i>Human Resource Management. </i>, 2015.","apa":"Baum, M., Schäfer, M., &#38; Kabst, R. (2015). Modeling the Impact of Advertisement-Image Congruity on Applicant Attraction. <i>Human Resource Management. </i>."},"title":"Modeling the Impact of Advertisement-Image Congruity on Applicant Attraction.","date_updated":"2022-01-06T07:01:55Z","author":[{"first_name":"M","last_name":"Baum","full_name":"Baum, M"},{"full_name":"Schäfer, M","last_name":"Schäfer","first_name":"M"},{"full_name":"Kabst, Rüdiger","id":"42362","last_name":"Kabst","first_name":"Rüdiger"}],"date_created":"2018-11-08T13:28:18Z"},{"year":"2015","citation":{"ama":"Baum M, Kabst R.  The effectiveness of recruitment advertisement and recruitment websites: Indirect and interactive effects on applicant attraction. <i>Human Resource Management (HRM)</i>. 2015.","chicago":"Baum, M, and Rüdiger Kabst. “ The Effectiveness of Recruitment Advertisement and Recruitment Websites: Indirect and Interactive Effects on Applicant Attraction.” <i>Human Resource Management (HRM).</i>, 2015.","ieee":"M. Baum and R. Kabst, “ The effectiveness of recruitment advertisement and recruitment websites: Indirect and interactive effects on applicant attraction.,” <i>Human Resource Management (HRM).</i>, 2015.","bibtex":"@article{Baum_Kabst_2015, title={ The effectiveness of recruitment advertisement and recruitment websites: Indirect and interactive effects on applicant attraction.}, journal={Human Resource Management (HRM).}, author={Baum, M and Kabst, Rüdiger}, year={2015} }","short":"M. Baum, R. Kabst, Human Resource Management (HRM). (2015).","mla":"Baum, M., and Rüdiger Kabst. “ The Effectiveness of Recruitment Advertisement and Recruitment Websites: Indirect and Interactive Effects on Applicant Attraction.” <i>Human Resource Management (HRM).</i>, 2015.","apa":"Baum, M., &#38; Kabst, R. (2015).  The effectiveness of recruitment advertisement and recruitment websites: Indirect and interactive effects on applicant attraction. <i>Human Resource Management (HRM).</i>"},"status":"public","type":"journal_article","publication":"Human Resource Management (HRM).","title":" The effectiveness of recruitment advertisement and recruitment websites: Indirect and interactive effects on applicant attraction.","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:01:55Z","_id":"5455","user_id":"46632","date_created":"2018-11-08T13:29:52Z","author":[{"full_name":"Baum, M","last_name":"Baum","first_name":"M"},{"first_name":"Rüdiger","id":"42362","full_name":"Kabst, Rüdiger","last_name":"Kabst"}],"department":[{"_id":"274"}]},{"title":"Recruitment Process Outsourcing and Applicant Reactions: When Does Image Make a Difference? ","date_updated":"2022-01-06T07:01:55Z","author":[{"full_name":"Wehner, M C","last_name":"Wehner","first_name":"M C"},{"first_name":"A","full_name":"Giardini, A","last_name":"Giardini"},{"first_name":"Rüdiger","full_name":"Kabst, Rüdiger","id":"42362","last_name":"Kabst"}],"date_created":"2018-11-08T13:31:08Z","year":"2015","citation":{"apa":"Wehner, M. C., Giardini, A., &#38; Kabst, R. (2015). Recruitment Process Outsourcing and Applicant Reactions: When Does Image Make a Difference? . <i>Human Resource Management. </i>.","bibtex":"@article{Wehner_Giardini_Kabst_2015, title={Recruitment Process Outsourcing and Applicant Reactions: When Does Image Make a Difference? }, journal={Human Resource Management. }, author={Wehner, M C and Giardini, A and Kabst, Rüdiger}, year={2015} }","mla":"Wehner, M. C., et al. “Recruitment Process Outsourcing and Applicant Reactions: When Does Image Make a Difference? .” <i>Human Resource Management. </i>, 2015.","short":"M.C. Wehner, A. Giardini, R. Kabst, Human Resource Management.  (2015).","ama":"Wehner MC, Giardini A, Kabst R. Recruitment Process Outsourcing and Applicant Reactions: When Does Image Make a Difference? . <i>Human Resource Management </i>. 2015.","chicago":"Wehner, M C, A Giardini, and Rüdiger Kabst. “Recruitment Process Outsourcing and Applicant Reactions: When Does Image Make a Difference? .” <i>Human Resource Management. </i>, 2015.","ieee":"M. C. Wehner, A. Giardini, and R. Kabst, “Recruitment Process Outsourcing and Applicant Reactions: When Does Image Make a Difference? ,” <i>Human Resource Management. </i>, 2015."},"language":[{"iso":"eng"}],"_id":"5456","department":[{"_id":"274"}],"user_id":"46632","status":"public","publication":"Human Resource Management. ","type":"journal_article"},{"title":"The effect of culture on the responsiveness of firms to mimetic forces: Imitative foreign joint venture entries into China, 1985–2003.","date_updated":"2022-01-06T07:01:55Z","volume":50,"date_created":"2018-11-08T13:35:48Z","author":[{"first_name":"C","full_name":"Li, C","last_name":"Li"},{"full_name":"Parboteeah, P","last_name":"Parboteeah","first_name":"P"}],"year":"2015","page":"465-476","intvolume":"        50","citation":{"mla":"Li, C., and P. Parboteeah. “The Effect of Culture on the Responsiveness of Firms to Mimetic Forces: Imitative Foreign Joint Venture Entries into China, 1985–2003.” <i>Journal of World Business</i>, vol. 50, no. 3, 2015, pp. 465–76.","bibtex":"@article{Li_Parboteeah_2015, title={The effect of culture on the responsiveness of firms to mimetic forces: Imitative foreign joint venture entries into China, 1985–2003.}, volume={50}, number={3}, journal={Journal of World Business}, author={Li, C and Parboteeah, P}, year={2015}, pages={465–476} }","short":"C. Li, P. Parboteeah, Journal of World Business 50 (2015) 465–476.","apa":"Li, C., &#38; Parboteeah, P. (2015). The effect of culture on the responsiveness of firms to mimetic forces: Imitative foreign joint venture entries into China, 1985–2003. <i>Journal of World Business</i>, <i>50</i>(3), 465–476.","chicago":"Li, C, and P Parboteeah. “The Effect of Culture on the Responsiveness of Firms to Mimetic Forces: Imitative Foreign Joint Venture Entries into China, 1985–2003.” <i>Journal of World Business</i> 50, no. 3 (2015): 465–76.","ieee":"C. Li and P. Parboteeah, “The effect of culture on the responsiveness of firms to mimetic forces: Imitative foreign joint venture entries into China, 1985–2003.,” <i>Journal of World Business</i>, vol. 50, no. 3, pp. 465–476, 2015.","ama":"Li C, Parboteeah P. The effect of culture on the responsiveness of firms to mimetic forces: Imitative foreign joint venture entries into China, 1985–2003. <i>Journal of World Business</i>. 2015;50(3):465-476."},"issue":"3","language":[{"iso":"eng"}],"_id":"5457","department":[{"_id":"274"}],"user_id":"46632","status":"public","publication":"Journal of World Business","type":"journal_article"},{"language":[{"iso":"eng"}],"_id":"5458","department":[{"_id":"274"}],"user_id":"46632","status":"public","publication":"International Journal of Human Resource Management.","type":"journal_article","title":"The influence of cultural context on the relationship between gender diversity and team performance: A meta-analysis.","date_updated":"2022-01-06T07:01:55Z","volume":26,"date_created":"2018-11-08T13:48:53Z","author":[{"first_name":"M","full_name":"Schneid, M","last_name":"Schneid"},{"first_name":"R","full_name":"Isidor, R","last_name":"Isidor"},{"full_name":"Li, C","last_name":"Li","first_name":"C"},{"first_name":"Rüdiger","full_name":"Kabst, Rüdiger","id":"42362","last_name":"Kabst"}],"year":"2015","intvolume":"        26","page":"733-756","citation":{"apa":"Schneid, M., Isidor, R., Li, C., &#38; Kabst, R. (2015). The influence of cultural context on the relationship between gender diversity and team performance: A meta-analysis. <i>International Journal of Human Resource Management.</i>, <i>26</i>(6), 733–756.","short":"M. Schneid, R. Isidor, C. Li, R. Kabst, International Journal of Human Resource Management. 26 (2015) 733–756.","bibtex":"@article{Schneid_Isidor_Li_Kabst_2015, title={The influence of cultural context on the relationship between gender diversity and team performance: A meta-analysis.}, volume={26}, number={6}, journal={International Journal of Human Resource Management.}, author={Schneid, M and Isidor, R and Li, C and Kabst, Rüdiger}, year={2015}, pages={733–756} }","mla":"Schneid, M., et al. “The Influence of Cultural Context on the Relationship between Gender Diversity and Team Performance: A Meta-Analysis.” <i>International Journal of Human Resource Management.</i>, vol. 26, no. 6, 2015, pp. 733–56.","ama":"Schneid M, Isidor R, Li C, Kabst R. The influence of cultural context on the relationship between gender diversity and team performance: A meta-analysis. <i>International Journal of Human Resource Management</i>. 2015;26(6):733-756.","ieee":"M. Schneid, R. Isidor, C. Li, and R. Kabst, “The influence of cultural context on the relationship between gender diversity and team performance: A meta-analysis.,” <i>International Journal of Human Resource Management.</i>, vol. 26, no. 6, pp. 733–756, 2015.","chicago":"Schneid, M, R Isidor, C Li, and Rüdiger Kabst. “The Influence of Cultural Context on the Relationship between Gender Diversity and Team Performance: A Meta-Analysis.” <i>International Journal of Human Resource Management.</i> 26, no. 6 (2015): 733–56."},"issue":"6"},{"ddc":["000"],"file_date_updated":"2018-12-13T15:08:50Z","language":[{"iso":"eng"}],"extern":"1","_id":"5541","department":[{"_id":"277"}],"user_id":"61579","status":"public","file":[{"file_size":669105,"access_level":"open_access","file_name":"ECIS - Proceedings version1.pdf","file_id":"6034","date_updated":"2018-12-13T15:08:50Z","date_created":"2018-12-07T11:43:06Z","creator":"hsiemes","relation":"main_file","content_type":"application/pdf"}],"publication":"23rd European Conference on Information Systems (ECIS 2015)","type":"conference","title":"Requirements for IT Security Metrics - An Argumentation Theory Based Approach","date_updated":"2022-01-06T07:01:58Z","oa":"1","author":[{"last_name":"Yasasin","full_name":"Yasasin, Emrah","first_name":"Emrah"},{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"}],"date_created":"2018-11-13T14:45:25Z","year":"2015","citation":{"ieee":"E. Yasasin and G. Schryen, “Requirements for IT Security Metrics - An Argumentation Theory Based Approach,” in <i>23rd European Conference on Information Systems (ECIS 2015)</i>, 2015.","chicago":"Yasasin, Emrah, and Guido Schryen. “Requirements for IT Security Metrics - An Argumentation Theory Based Approach.” In <i>23rd European Conference on Information Systems (ECIS 2015)</i>, 2015.","ama":"Yasasin E, Schryen G. Requirements for IT Security Metrics - An Argumentation Theory Based Approach. In: <i>23rd European Conference on Information Systems (ECIS 2015)</i>. ; 2015.","apa":"Yasasin, E., &#38; Schryen, G. (2015). Requirements for IT Security Metrics - An Argumentation Theory Based Approach. In <i>23rd European Conference on Information Systems (ECIS 2015)</i>.","short":"E. Yasasin, G. Schryen, in: 23rd European Conference on Information Systems (ECIS 2015), 2015.","bibtex":"@inproceedings{Yasasin_Schryen_2015, title={Requirements for IT Security Metrics - An Argumentation Theory Based Approach}, booktitle={23rd European Conference on Information Systems (ECIS 2015)}, author={Yasasin, Emrah and Schryen, Guido}, year={2015} }","mla":"Yasasin, Emrah, and Guido Schryen. “Requirements for IT Security Metrics - An Argumentation Theory Based Approach.” <i>23rd European Conference on Information Systems (ECIS 2015)</i>, 2015."},"has_accepted_license":"1"},{"status":"public","file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2018-12-07T11:45:31Z","creator":"hsiemes","date_updated":"2018-12-13T15:09:32Z","file_name":"ICIS PROCEEDINGS PAPER - Security Investments.pdf","access_level":"open_access","file_id":"6038","file_size":958019}],"abstract":[{"lang":"eng","text":"The protection of information technology (IT) has become and is predicted to remain a key economic challenge for organizations. While research on IT security investment is fast growing, it lacks a theoretical basis for structuring research, explaining economic-technological phenomena and guide future research. We address this shortcoming by suggesting a new theoretical model emerging from a multi-theoretical perspective adopt-ing the Resource-Based View and the Organizational Learning Theory. The joint appli-cation of these theories allows to conceptualize in one theoretical model the organiza-tional learning effects that occur when the protection of organizational resources through IT security countermeasures develops over time. We use this model of IT security invest-ments to synthesize findings of a large body of literature and to derive research gaps. We also discuss managerial implications of (closing) these gaps by providing practical ex-amples."}],"publication":"International Conference on Information Systems","type":"conference","extern":"1","file_date_updated":"2018-12-13T15:09:32Z","language":[{"iso":"eng"}],"keyword":["Information Security","Investment","Literature review","Resource-based View","Organi-zational Learning Theory","Multi-theoretical Perspective"],"ddc":["000"],"department":[{"_id":"277"}],"user_id":"61579","_id":"5588","citation":{"apa":"Weishäupl, E., Yasasin, E., &#38; Schryen, G. (2015). A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory. In <i>International Conference on Information Systems</i>.","mla":"Weishäupl, Eva, et al. “A Multi-Theoretical Literature Review on Information Security Investments Using the Resource-Based View and the Organizational Learning Theory.” <i>International Conference on Information Systems</i>, 2015.","bibtex":"@inproceedings{Weishäupl_Yasasin_Schryen_2015, title={A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory}, booktitle={International Conference on Information Systems}, author={Weishäupl, Eva and Yasasin, Emrah and Schryen, Guido}, year={2015} }","short":"E. Weishäupl, E. Yasasin, G. Schryen, in: International Conference on Information Systems, 2015.","ieee":"E. Weishäupl, E. Yasasin, and G. Schryen, “A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory,” in <i>International Conference on Information Systems</i>, 2015.","chicago":"Weishäupl, Eva, Emrah Yasasin, and Guido Schryen. “A Multi-Theoretical Literature Review on Information Security Investments Using the Resource-Based View and the Organizational Learning Theory.” In <i>International Conference on Information Systems</i>, 2015.","ama":"Weishäupl E, Yasasin E, Schryen G. A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory. In: <i>International Conference on Information Systems</i>. ; 2015."},"year":"2015","has_accepted_license":"1","title":"A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory","date_created":"2018-11-14T11:25:38Z","author":[{"last_name":"Weishäupl","full_name":"Weishäupl, Eva","first_name":"Eva"},{"first_name":"Emrah","full_name":"Yasasin, Emrah","last_name":"Yasasin"},{"first_name":"Guido","id":"72850","full_name":"Schryen, Guido","last_name":"Schryen"}],"oa":"1","date_updated":"2022-01-06T07:02:03Z"},{"type":"conference","publication":"23rd European Conference on Information Systems (ECIS 2015)","file":[{"relation":"main_file","content_type":"application/pdf","access_level":"open_access","file_id":"6035","file_name":"ECIS - Proceedings version2.pdf","file_size":334025,"creator":"hsiemes","date_created":"2018-12-07T11:43:38Z","date_updated":"2018-12-13T15:09:01Z"}],"status":"public","user_id":"61579","department":[{"_id":"277"}],"_id":"5589","extern":"1","language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:09:01Z","ddc":["000"],"has_accepted_license":"1","citation":{"chicago":"Weishäupl, Eva, Emrah Yasasin, and Guido Schryen. “IT Security Investments Through the Lens of the Resource-Based View: A New Theoretical Model and Literature Review.” In <i>23rd European Conference on Information Systems (ECIS 2015)</i>, 2015.","ieee":"E. Weishäupl, E. Yasasin, and G. Schryen, “IT Security Investments Through the Lens of the Resource-Based View: A new Theoretical Model and Literature Review,” in <i>23rd European Conference on Information Systems (ECIS 2015)</i>, 2015.","ama":"Weishäupl E, Yasasin E, Schryen G. IT Security Investments Through the Lens of the Resource-Based View: A new Theoretical Model and Literature Review. In: <i>23rd European Conference on Information Systems (ECIS 2015)</i>. ; 2015.","apa":"Weishäupl, E., Yasasin, E., &#38; Schryen, G. (2015). IT Security Investments Through the Lens of the Resource-Based View: A new Theoretical Model and Literature Review. In <i>23rd European Conference on Information Systems (ECIS 2015)</i>.","short":"E. Weishäupl, E. Yasasin, G. Schryen, in: 23rd European Conference on Information Systems (ECIS 2015), 2015.","bibtex":"@inproceedings{Weishäupl_Yasasin_Schryen_2015, title={IT Security Investments Through the Lens of the Resource-Based View: A new Theoretical Model and Literature Review}, booktitle={23rd European Conference on Information Systems (ECIS 2015)}, author={Weishäupl, Eva and Yasasin, Emrah and Schryen, Guido}, year={2015} }","mla":"Weishäupl, Eva, et al. “IT Security Investments Through the Lens of the Resource-Based View: A New Theoretical Model and Literature Review.” <i>23rd European Conference on Information Systems (ECIS 2015)</i>, 2015."},"year":"2015","author":[{"full_name":"Weishäupl, Eva","last_name":"Weishäupl","first_name":"Eva"},{"first_name":"Emrah","last_name":"Yasasin","full_name":"Yasasin, Emrah"},{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"}],"date_created":"2018-11-14T11:26:15Z","oa":"1","date_updated":"2022-01-06T07:02:03Z","title":"IT Security Investments Through the Lens of the Resource-Based View: A new Theoretical Model and Literature Review"},{"publication":"2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)","type":"conference","status":"public","file":[{"content_type":"application/pdf","relation":"main_file","creator":"hsiemes","date_created":"2018-12-07T11:46:28Z","date_updated":"2018-12-13T15:09:54Z","file_id":"6040","file_name":"Towards an Economic Approach to IAMS.PDF","access_level":"open_access","file_size":166015}],"abstract":[{"lang":"eng","text":"Nowadays, providing employees with failure-free access to various systems, applications and services is a crucial factor for organizations? success as disturbances potentially inhibit smooth workflows and thereby harm productivity. However, it is a challenging task to assign access rights to employees? accounts within a satisfying time frame. In addition, the management of multiple accounts and identities can be very onerous and time consuming for the responsible administrator and therefore expensive for the organization. In order to meet these challenges, firms decide to invest in introducing an Identity and Access Management System (IAMS) that supports the organization by using policies to assign permissions to accounts, groups, and roles. In practice, since various versions of IAMSs exist, it is a challenging task to decide upon introduction of an IAMS. The following study proposes a first attempt of a decision support model for practitioners which considers four alternatives: Introduction of an IAMS with Role-based Access Control RBAC) or without and no introduction of IAMS again with or without RBAC. To underpin the practical applicability of the proposed model, we parametrize and operationalize it based on a real world use case using input from an expert interview."}],"department":[{"_id":"277"}],"user_id":"61579","_id":"5590","extern":"1","file_date_updated":"2018-12-13T15:09:54Z","language":[{"iso":"eng"}],"keyword":["Identity and Access Management","Economic Decision Making","Information Systems","Information Security Investment","Decision Theory"],"ddc":["000"],"has_accepted_license":"1","citation":{"mla":"Weishäupl, Eva, et al. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>, 2015.","short":"E. Weishäupl, M. Kunz, E. Yasasin, G. Wagner, J. Prester, G. Schryen, G. Pernul, in: 2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15), 2015.","bibtex":"@inproceedings{Weishäupl_Kunz_Yasasin_Wagner_Prester_Schryen_Pernul_2015, title={Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory}, booktitle={2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)}, author={Weishäupl, Eva and Kunz, Michael and Yasasin, Emrah and Wagner, Gerit and Prester, Julian and Schryen, Guido and Pernul, Günther}, year={2015} }","apa":"Weishäupl, E., Kunz, M., Yasasin, E., Wagner, G., Prester, J., Schryen, G., &#38; Pernul, G. (2015). Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In <i>2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)</i>.","ama":"Weishäupl E, Kunz M, Yasasin E, et al. Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In: <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>. ; 2015.","chicago":"Weishäupl, Eva, Michael Kunz, Emrah Yasasin, Gerit Wagner, Julian Prester, Guido Schryen, and Günther Pernul. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” In <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>, 2015.","ieee":"E. Weishäupl <i>et al.</i>, “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory,” in <i>2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)</i>, 2015."},"year":"2015","author":[{"full_name":"Weishäupl, Eva","last_name":"Weishäupl","first_name":"Eva"},{"first_name":"Michael","last_name":"Kunz","full_name":"Kunz, Michael"},{"last_name":"Yasasin","full_name":"Yasasin, Emrah","first_name":"Emrah"},{"first_name":"Gerit","last_name":"Wagner","full_name":"Wagner, Gerit"},{"full_name":"Prester, Julian","last_name":"Prester","first_name":"Julian"},{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"},{"first_name":"Günther","full_name":"Pernul, Günther","last_name":"Pernul"}],"date_created":"2018-11-14T11:27:20Z","date_updated":"2022-01-06T07:02:04Z","oa":"1","title":"Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory"},{"year":"2015","citation":{"bibtex":"@article{Schryen_Weishäupl_2015, title={IT-Sicherheit: Ökonomisch Planen und Bewerten}, number={2}, journal={Managementkompass}, publisher={Frankfurt Business Media, Der F.A.Z.-Fachverlag}, author={Schryen, Guido and Weishäupl, Eva}, year={2015}, pages={17–18} }","mla":"Schryen, Guido, and Eva Weishäupl. “IT-Sicherheit: Ökonomisch Planen Und Bewerten.” <i>Managementkompass</i>, no. 2, Frankfurt Business Media, Der F.A.Z.-Fachverlag, 2015, pp. 17–18.","short":"G. Schryen, E. Weishäupl, Managementkompass (2015) 17–18.","apa":"Schryen, G., &#38; Weishäupl, E. (2015). IT-Sicherheit: Ökonomisch Planen und Bewerten. <i>Managementkompass</i>, (2), 17–18.","ama":"Schryen G, Weishäupl E. IT-Sicherheit: Ökonomisch Planen und Bewerten. <i>Managementkompass</i>. 2015;(2):17-18.","ieee":"G. Schryen and E. Weishäupl, “IT-Sicherheit: Ökonomisch Planen und Bewerten,” <i>Managementkompass</i>, no. 2, pp. 17–18, 2015.","chicago":"Schryen, Guido, and Eva Weishäupl. “IT-Sicherheit: Ökonomisch Planen Und Bewerten.” <i>Managementkompass</i>, no. 2 (2015): 17–18."},"page":"17-18","has_accepted_license":"1","issue":"2","title":"IT-Sicherheit: Ökonomisch Planen und Bewerten","oa":"1","date_updated":"2022-01-06T07:02:09Z","publisher":"Frankfurt Business Media, Der F.A.Z.-Fachverlag","date_created":"2018-11-14T13:59:53Z","author":[{"first_name":"Guido","full_name":"Schryen, Guido","id":"72850","last_name":"Schryen"},{"last_name":"Weishäupl","full_name":"Weishäupl, Eva","first_name":"Eva"}],"file":[{"content_type":"application/pdf","relation":"main_file","creator":"hsiemes","date_created":"2018-12-07T11:46:04Z","date_updated":"2018-12-13T15:09:42Z","file_id":"6039","file_name":"MK-DigitalSecurity-2015_Schryen.pdf","access_level":"open_access","file_size":101976}],"status":"public","type":"journal_article","publication":"Managementkompass","ddc":["000"],"file_date_updated":"2018-12-13T15:09:42Z","extern":"1","language":[{"iso":"eng"}],"_id":"5616","user_id":"61579","department":[{"_id":"277"}]},{"_id":"5618","user_id":"61579","department":[{"_id":"277"}],"ddc":["000"],"keyword":["Literature review","Research methods/methodology","Theory of knowledge"],"language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:09:22Z","extern":"1","type":"conference","publication":"International Conference on Information Systems (ICIS)","abstract":[{"text":"Literature reviews play an important role in the development of knowledge. Yet, we observe a lack of theoretical underpinning of and epistemological insights into how literature reviews can contribute to knowledge creation and have actually contributed in the IS discipline. To address these theoretical and empirical research gaps, we suggest a novel epistemological model of literature reviews. This model allows us to align different contributions of literature reviews with their underlying knowledge conversions - thereby building a bridge between the previously largely unconnected fields of literature reviews and epistemology. We evaluate the appropriateness of the model by conducting an empirical analysis of 173 IS literature reviews which were published in 39 pertinent IS journals between 2000 and 2014. Based on this analysis, we derive an epistemological taxonomy of IS literature reviews, which complements previously suggested typologies.","lang":"eng"}],"file":[{"access_level":"open_access","file_id":"6037","file_name":"ICIS PROCEEDINGS PAPER - Literature Reviews.pdf","file_size":487102,"date_created":"2018-12-07T11:44:48Z","creator":"hsiemes","date_updated":"2018-12-13T15:09:22Z","relation":"main_file","content_type":"application/pdf"}],"status":"public","date_updated":"2022-01-06T07:02:10Z","oa":"1","date_created":"2018-11-14T14:01:13Z","author":[{"first_name":"Guido","full_name":"Schryen, Guido","id":"72850","last_name":"Schryen"},{"full_name":"Wagner, Gerit","last_name":"Wagner","first_name":"Gerit"},{"first_name":"Alexander","last_name":"Benlian","full_name":"Benlian, Alexander"}],"title":"Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature","has_accepted_license":"1","year":"2015","citation":{"apa":"Schryen, G., Wagner, G., &#38; Benlian, A. (2015). Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature. In <i>International Conference on Information Systems (ICIS)</i>.","short":"G. Schryen, G. Wagner, A. Benlian, in: International Conference on Information Systems (ICIS), 2015.","mla":"Schryen, Guido, et al. “Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature.” <i>International Conference on Information Systems (ICIS)</i>, 2015.","bibtex":"@inproceedings{Schryen_Wagner_Benlian_2015, title={Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature}, booktitle={International Conference on Information Systems (ICIS)}, author={Schryen, Guido and Wagner, Gerit and Benlian, Alexander}, year={2015} }","ama":"Schryen G, Wagner G, Benlian A. Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature. In: <i>International Conference on Information Systems (ICIS)</i>. ; 2015.","ieee":"G. Schryen, G. Wagner, and A. Benlian, “Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature,” in <i>International Conference on Information Systems (ICIS)</i>, 2015.","chicago":"Schryen, Guido, Gerit Wagner, and Alexander Benlian. “Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature.” In <i>International Conference on Information Systems (ICIS)</i>, 2015."}},{"citation":{"bibtex":"@article{Schryen_Rauchecker_Comes_2015, title={Resource Planning in Disaster Response - Decision Support Models and Methodologies}, volume={57}, number={4}, journal={Business &#38; Information Systems Engineering (BISE)}, publisher={Springer}, author={Schryen, Guido and Rauchecker, Gerhard and Comes, Martina}, year={2015}, pages={243–259} }","mla":"Schryen, Guido, et al. “Resource Planning in Disaster Response - Decision Support Models and Methodologies.” <i>Business &#38; Information Systems Engineering (BISE)</i>, vol. 57, no. 4, Springer, 2015, pp. 243–59.","short":"G. Schryen, G. Rauchecker, M. Comes, Business &#38; Information Systems Engineering (BISE) 57 (2015) 243–259.","apa":"Schryen, G., Rauchecker, G., &#38; Comes, M. (2015). Resource Planning in Disaster Response - Decision Support Models and Methodologies. <i>Business &#38; Information Systems Engineering (BISE)</i>, <i>57</i>(4), 243–259.","ama":"Schryen G, Rauchecker G, Comes M. Resource Planning in Disaster Response - Decision Support Models and Methodologies. <i>Business &#38; Information Systems Engineering (BISE)</i>. 2015;57(4):243-259.","chicago":"Schryen, Guido, Gerhard Rauchecker, and Martina Comes. “Resource Planning in Disaster Response - Decision Support Models and Methodologies.” <i>Business &#38; Information Systems Engineering (BISE)</i> 57, no. 4 (2015): 243–59.","ieee":"G. Schryen, G. Rauchecker, and M. Comes, “Resource Planning in Disaster Response - Decision Support Models and Methodologies,” <i>Business &#38; Information Systems Engineering (BISE)</i>, vol. 57, no. 4, pp. 243–259, 2015."},"page":"243-259","intvolume":"        57","year":"2015","issue":"4","has_accepted_license":"1","title":"Resource Planning in Disaster Response - Decision Support Models and Methodologies","date_created":"2018-11-14T14:07:25Z","author":[{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"},{"last_name":"Rauchecker","full_name":"Rauchecker, Gerhard","first_name":"Gerhard"},{"first_name":"Martina","full_name":"Comes, Martina","last_name":"Comes"}],"volume":57,"date_updated":"2022-01-06T07:02:12Z","publisher":"Springer","oa":"1","file":[{"date_updated":"2018-12-13T15:08:39Z","date_created":"2018-12-07T11:42:18Z","creator":"hsiemes","file_size":733154,"access_level":"open_access","file_id":"6032","file_name":"BISE Springer Paper.pdf","content_type":"application/pdf","relation":"main_file"}],"status":"public","type":"journal_article","publication":"Business & Information Systems Engineering (BISE)","file_date_updated":"2018-12-13T15:08:39Z","language":[{"iso":"eng"}],"extern":"1","ddc":["000"],"user_id":"61579","department":[{"_id":"277"}],"_id":"5622"},{"status":"public","type":"journal_article","extern":"1","file_date_updated":"2018-12-13T15:10:32Z","department":[{"_id":"277"}],"user_id":"61579","_id":"5634","intvolume":"        37","page":"286-325","citation":{"apa":"Schryen, G. (2015). Writing qualitative IS literature reviews ? Guidelines for synthesis, interpretation and guidance of research. <i>Communications of the AIS</i>, <i>37</i>(Art 12), 286–325.","bibtex":"@article{Schryen_2015, title={Writing qualitative IS literature reviews ? Guidelines for synthesis, interpretation and guidance of research}, volume={37}, number={Art 12}, journal={Communications of the AIS}, publisher={Association for Information Systems (AIS); Association for Computing Machinery (ACM)}, author={Schryen, Guido}, year={2015}, pages={286–325} }","mla":"Schryen, Guido. “Writing Qualitative IS Literature Reviews ? Guidelines for Synthesis, Interpretation and Guidance of Research.” <i>Communications of the AIS</i>, vol. 37, no. Art 12, Association for Information Systems (AIS); Association for Computing Machinery (ACM), 2015, pp. 286–325.","short":"G. Schryen, Communications of the AIS 37 (2015) 286–325.","chicago":"Schryen, Guido. “Writing Qualitative IS Literature Reviews ? Guidelines for Synthesis, Interpretation and Guidance of Research.” <i>Communications of the AIS</i> 37, no. Art 12 (2015): 286–325.","ieee":"G. Schryen, “Writing qualitative IS literature reviews ? Guidelines for synthesis, interpretation and guidance of research,” <i>Communications of the AIS</i>, vol. 37, no. Art 12, pp. 286–325, 2015.","ama":"Schryen G. Writing qualitative IS literature reviews ? Guidelines for synthesis, interpretation and guidance of research. <i>Communications of the AIS</i>. 2015;37(Art 12):286-325."},"has_accepted_license":"1","volume":37,"author":[{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"}],"oa":"1","date_updated":"2022-01-06T07:02:15Z","file":[{"date_updated":"2018-12-13T15:10:32Z","creator":"hsiemes","date_created":"2018-12-07T11:46:54Z","file_size":1048400,"file_id":"6041","access_level":"open_access","file_name":"Writing Qualitative Is Literature Reviewsguidelines For Synthesis In.pdf","content_type":"application/pdf","relation":"main_file"}],"publication":"Communications of the AIS","language":[{"iso":"eng"}],"ddc":["000"],"year":"2015","issue":"Art 12","title":"Writing qualitative IS literature reviews ? Guidelines for synthesis, interpretation and guidance of research","date_created":"2018-11-14T14:26:59Z","publisher":"Association for Information Systems (AIS); Association for Computing Machinery (ACM)"},{"title":"Discovering (Hidden) Pathways within the Framework of Design Based Research (DBR) - Developing and \"Arena of Innovation\" in VET Contexts","date_updated":"2022-01-06T07:03:08Z","author":[{"id":"5994","full_name":"Frehe, Petra","last_name":"Frehe","first_name":"Petra"},{"first_name":"H.-Hugo","last_name":"Kremer","full_name":"Kremer, H.-Hugo","id":"15280"}],"date_created":"2019-01-04T10:50:39Z","place":"Bremen","year":"2015","citation":{"chicago":"Frehe, Petra, and H.-Hugo Kremer. “Discovering (Hidden) Pathways within the Framework of Design Based Research (DBR) - Developing and ‘Arena of Innovation’ in VET Contexts.” In <i>Crossing Boundaries in Vocational Education and Training: Innovative Concepts for the 21st Century. Conference Proceedings.</i>, edited by M. Gessler and L. Freund, 17–24. Bremen, 2015.","ieee":"P. Frehe and H.-H. Kremer, “Discovering (Hidden) Pathways within the Framework of Design Based Research (DBR) - Developing and ‘Arena of Innovation’ in VET Contexts,” in <i>Crossing Boundaries in Vocational Education and Training: Innovative Concepts for the 21st Century. Conference Proceedings.</i>, M. Gessler and L. Freund, Eds. Bremen, 2015, pp. 17–24.","ama":"Frehe P, Kremer H-H. Discovering (Hidden) Pathways within the Framework of Design Based Research (DBR) - Developing and “Arena of Innovation” in VET Contexts. In: Gessler M, Freund L, eds. <i>Crossing Boundaries in Vocational Education and Training: Innovative Concepts for the 21st Century. Conference Proceedings.</i> Bremen; 2015:17-24.","apa":"Frehe, P., &#38; Kremer, H.-H. (2015). Discovering (Hidden) Pathways within the Framework of Design Based Research (DBR) - Developing and “Arena of Innovation” in VET Contexts. In M. Gessler &#38; L. Freund (Eds.), <i>Crossing Boundaries in Vocational Education and Training: Innovative Concepts for the 21st Century. Conference Proceedings.</i> (pp. 17–24). Bremen.","mla":"Frehe, Petra, and H. Hugo Kremer. “Discovering (Hidden) Pathways within the Framework of Design Based Research (DBR) - Developing and ‘Arena of Innovation’ in VET Contexts.” <i>Crossing Boundaries in Vocational Education and Training: Innovative Concepts for the 21st Century. Conference Proceedings.</i>, edited by M. Gessler and L. Freund, 2015, pp. 17–24.","bibtex":"@inbook{Frehe_Kremer_2015, place={Bremen}, title={Discovering (Hidden) Pathways within the Framework of Design Based Research (DBR) - Developing and “Arena of Innovation” in VET Contexts}, booktitle={Crossing Boundaries in Vocational Education and Training: Innovative Concepts for the 21st Century. Conference Proceedings.}, author={Frehe, Petra and Kremer, H.-Hugo}, editor={Gessler, M. and Freund, L.Editors}, year={2015}, pages={17–24} }","short":"P. Frehe, H.-H. Kremer, in: M. Gessler, L. Freund (Eds.), Crossing Boundaries in Vocational Education and Training: Innovative Concepts for the 21st Century. Conference Proceedings., Bremen, 2015, pp. 17–24."},"page":"17-24","language":[{"iso":"eng"}],"_id":"6503","user_id":"44715","department":[{"_id":"211"}],"editor":[{"first_name":"M.","last_name":"Gessler","full_name":"Gessler, M."},{"first_name":"L.","full_name":"Freund, L.","last_name":"Freund"}],"status":"public","type":"book_chapter","publication":"Crossing Boundaries in Vocational Education and Training: Innovative Concepts for the 21st Century. Conference Proceedings."},{"_id":"6978","department":[{"_id":"211"}],"user_id":"74378","language":[{"iso":"ger"}],"type":"book_editor","editor":[{"full_name":"Kremer, H.-Hugo","id":"15280","last_name":"Kremer","first_name":"H.-Hugo"},{"last_name":"Beutner","id":"21118","full_name":"Beutner, Marc","first_name":"Marc"}],"status":"public","date_updated":"2022-01-06T07:03:25Z","date_created":"2019-01-25T09:02:01Z","title":"Individuelle Kompetenzentwicklungswege: Bildungsarbeit in einer dualisierten Ausbildungsvorbereitung. Ergebnisse und Reflexionen aus dem Forschungs- und Entwicklungsprojekt InBig","year":"2015","place":"Detmold","citation":{"apa":"Kremer, H.-H., &#38; Beutner, M. (Eds.). (2015). <i>Individuelle Kompetenzentwicklungswege: Bildungsarbeit in einer dualisierten Ausbildungsvorbereitung. Ergebnisse und Reflexionen aus dem Forschungs- und Entwicklungsprojekt InBig</i>. Detmold.","bibtex":"@book{Kremer_Beutner_2015, place={Detmold}, title={Individuelle Kompetenzentwicklungswege: Bildungsarbeit in einer dualisierten Ausbildungsvorbereitung. Ergebnisse und Reflexionen aus dem Forschungs- und Entwicklungsprojekt InBig}, year={2015} }","mla":"Kremer, H. Hugo, and Marc Beutner, editors. <i>Individuelle Kompetenzentwicklungswege: Bildungsarbeit in einer dualisierten Ausbildungsvorbereitung. Ergebnisse und Reflexionen aus dem Forschungs- und Entwicklungsprojekt InBig</i>. 2015.","short":"H.-H. Kremer, M. Beutner, eds., Individuelle Kompetenzentwicklungswege: Bildungsarbeit in einer dualisierten Ausbildungsvorbereitung. Ergebnisse und Reflexionen aus dem Forschungs- und Entwicklungsprojekt InBig, Detmold, 2015.","chicago":"Kremer, H.-Hugo, and Marc Beutner, eds. <i>Individuelle Kompetenzentwicklungswege: Bildungsarbeit in einer dualisierten Ausbildungsvorbereitung. Ergebnisse und Reflexionen aus dem Forschungs- und Entwicklungsprojekt InBig</i>. Detmold, 2015.","ieee":"H.-H. Kremer and M. Beutner, Eds., <i>Individuelle Kompetenzentwicklungswege: Bildungsarbeit in einer dualisierten Ausbildungsvorbereitung. Ergebnisse und Reflexionen aus dem Forschungs- und Entwicklungsprojekt InBig</i>. Detmold, 2015.","ama":"Kremer H-H, Beutner M, eds. <i>Individuelle Kompetenzentwicklungswege: Bildungsarbeit in einer dualisierten Ausbildungsvorbereitung. Ergebnisse und Reflexionen aus dem Forschungs- und Entwicklungsprojekt InBig</i>. Detmold; 2015."}},{"citation":{"mla":"Gorbacheva, Elena, et al. “A Gender Perspective on Business Process Management Competences Offered on Professional Online Social Networks.” <i>European Conference on Information Systems</i>, 2015, doi:<a href=\"https://doi.org/10.18151/7217329\">10.18151/7217329</a>.","bibtex":"@inproceedings{Gorbacheva_Stein_Schmiedel_Müller_2015, title={A gender perspective on business process management competences offered on professional online social networks}, DOI={<a href=\"https://doi.org/10.18151/7217329\">10.18151/7217329</a>}, booktitle={European Conference on Information Systems}, author={Gorbacheva, Elena and Stein, Armin and Schmiedel, Theresa and Müller, Oliver}, year={2015} }","short":"E. Gorbacheva, A. Stein, T. Schmiedel, O. Müller, in: European Conference on Information Systems, 2015.","apa":"Gorbacheva, E., Stein, A., Schmiedel, T., &#38; Müller, O. (2015). A gender perspective on business process management competences offered on professional online social networks. In <i>European Conference on Information Systems</i>. <a href=\"https://doi.org/10.18151/7217329\">https://doi.org/10.18151/7217329</a>","ieee":"E. Gorbacheva, A. Stein, T. Schmiedel, and O. Müller, “A gender perspective on business process management competences offered on professional online social networks,” in <i>European Conference on Information Systems</i>, 2015.","chicago":"Gorbacheva, Elena, Armin Stein, Theresa Schmiedel, and Oliver Müller. “A Gender Perspective on Business Process Management Competences Offered on Professional Online Social Networks.” In <i>European Conference on Information Systems</i>, 2015. <a href=\"https://doi.org/10.18151/7217329\">https://doi.org/10.18151/7217329</a>.","ama":"Gorbacheva E, Stein A, Schmiedel T, Müller O. A gender perspective on business process management competences offered on professional online social networks. In: <i>European Conference on Information Systems</i>. ; 2015. doi:<a href=\"https://doi.org/10.18151/7217329\">10.18151/7217329</a>"},"year":"2015","publication_identifier":{"isbn":["978-3-00-050284-2"]},"doi":"10.18151/7217329","title":"A gender perspective on business process management competences offered on professional online social networks","author":[{"first_name":"Elena","last_name":"Gorbacheva","full_name":"Gorbacheva, Elena"},{"full_name":"Stein, Armin","last_name":"Stein","first_name":"Armin"},{"first_name":"Theresa","last_name":"Schmiedel","full_name":"Schmiedel, Theresa"},{"first_name":"Oliver","last_name":"Müller","full_name":"Müller, Oliver","id":"72849"}],"date_created":"2020-06-22T08:14:06Z","date_updated":"2022-01-06T06:53:05Z","status":"public","type":"conference","publication":"European Conference on Information Systems","extern":"1","language":[{"iso":"eng"}],"user_id":"71922","department":[{"_id":"196"}],"_id":"17105"}]
