default search action
Christian Sillaber
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j6]Horst Treiblmaier, Christian Sillaber:
The impact of blockchain on e-commerce: A framework for salient research topics. Electron. Commer. Res. Appl. 48: 101054 (2021) - [j5]Christian Sillaber, Bernhard Waltl, Horst Treiblmaier, Ulrich Gallersdörfer, Michael Felderer:
Laying the foundation for smart contract development: an integrated engineering process model. Inf. Syst. E Bus. Manag. 19(3): 863-882 (2021)
2010 – 2019
- 2019
- [j4]Christian Sillaber, Andrea Mussmann, Ruth Breu:
Experience: Data and Information Quality Challenges in Governance, Risk, and Compliance Management. ACM J. Data Inf. Qual. 11(2): 6:1-6:14 (2019) - 2018
- [j3]Michael Brunner, Christian Sillaber, Lukas Demetz, Markus Manhart, Ruth Breu:
Towards data-driven decision support for organizational IT security audits. it Inf. Technol. 60(4): 207 (2018) - [c17]Christian Sillaber, Nikolas Huber, Andrea Mussmann, Ruth Breu:
Post-Merger IT Integration Success and Performance Measurement: A Systematic Literature Study. AMCIS 2018 - [c16]Clemens Sauerwein, Christian Sillaber, Ruth Breu:
Shadow Cyber Threat Intelligence and Its Use in Information Security and Risk Management Processes. MKWI 2018: 1333-1344 - [c15]Christian Sillaber, Clemens Sauerwein, Andrea Mussmann, Ruth Breu:
Towards a Maturity Model for Inter-Organizational Cyber Threat Intelligence Sharing: A Case Study of Stakeholders' Expectations and Willingness to Share. MKWI 2018: 1409-1420 - [c14]Clemens Sauerwein, Christian Sillaber, Michael M. Huber, Andrea Mussmann, Ruth Breu:
The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter. SEC 2018: 201-215 - 2017
- [j2]Christian Sillaber, Bernhard Waltl:
Life Cycle of Smart Contracts in Blockchain Ecosystems. Datenschutz und Datensicherheit 41(8): 497-500 (2017) - [c13]Michael Brunner, Christian Sillaber, Ruth Breu:
Towards Automation in Information Security Management Systems. QRS 2017: 160-167 - [c12]Clemens Sauerwein, Christian Sillaber, Andrea Mussmann, Ruth Breu:
Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives. Wirtschaftsinformatik 2017 - 2016
- [j1]Ruth Breu, Christian Sillaber, Michael Brunner:
Security im Produkt-Lifecycle - Lästige Pflicht oder Chance? Inform. Spektrum 39(5): 353-361 (2016) - [c11]Christian Sillaber, Clemens Sauerwein, Andrea Mussmann, Ruth Breu:
Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice. WISCS@CCS 2016: 65-70 - [c10]Christian Sillaber, Alexander Graf, Ruth Breu:
An Information System Agnostic Environment for Reproducible Experiments. ECIS 2016 - 2015
- [c9]Christian Sillaber, Ruth Breu:
Identifying Blind Spots in IS Security Risk Management Processes Using Qualitative Model Analysis. HCI (22) 2015: 252-259 - [c8]Christian Sillaber, Ruth Breu:
Using Stakeholder Knowledge for Data Quality Assessment in IS Security Risk Management Processes. CPR 2015: 153-159 - [c7]Christian Sillaber, Ruth Breu:
Using Business Process Model Awareness to improve Stakeholder Participation in Information Systems Security Risk Management Processes. Wirtschaftsinformatik 2015: 1177-1190 - 2014
- [c6]Christian Sillaber, Ruth Breu:
Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security Requirements. ARES 2014: 251-258 - 2013
- [c5]Christian Sillaber, Michael Brunner, Ruth Breu:
Towards an Architecture for Collaborative Cross-Organizational Security Requirements Management. BIS 2013: 199-210 - [c4]Christian Sillaber, Ruth Breu:
Improving Near-Duplicate Detection in Multi-Layered Collaborative Requirements Engineering Discussions Through Discussion Clustering. KMO 2013: 249-261 - [c3]Christian Sillaber, Ruth Breu:
The Impact of Knowledge Sharing Platforms in Distributed Requirements Engineering Scenarios: A Systematic Review. KMO 2013: 579-591 - 2012
- [c2]Christian Sillaber, Ruth Breu:
Managing legal compliance through security requirements across service provider chains: A case study on the German Federal Data Protection Act. GI-Jahrestagung 2012: 1306-1317 - [c1]Christian Sillaber, Joanna Chimiak-Opoka, Ruth Breu:
Understanding and Modeling Usage Decline in Social Networking Services. KMO 2012: 377-388
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-31 01:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint