default search action
Stefan Sackmann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c56]Hans Betke, Martina Sperling, Guido Schryen, Stefan Sackmann:
A Design Theory for Spontaneous Volunteer Coordination Systems in Disaster Response. HICSS 2024: 2076-2085 - 2023
- [j18]Michael Seifert, Stephan Kuehnel, Stefan Sackmann:
Hybrid Clouds Arising from Software as a Service Adoption: Challenges, Solutions, and Future Research Directions. ACM Comput. Surv. 55(11): 228:1-228:35 (2023) - [c55]Laura Niedzela, Stephan Kuehnel, Ilja Nastjuk, Tizian Matschak, Stefan Sackmann, Simon Trang:
A Qualitative Study on Acceptance Factors of Economic Approaches on IT Security Investment Decisions. AMCIS 2023 - [c54]Johannes Damarowsky, Stephan Kuehnel, Martin Böhmer, Stefan Sackmann:
A Reference Architecture for a Workflow Management System Front End Designed for Augmented Reality Headsets. ECIS 2023 - [c53]Leonard Nake, Stephan Kuehnel, Laura Bauer, Stefan Sackmann:
Towards Identifying GDPR-Critical Tasks in Textual Business Process Descriptions. GI-Jahrestagung 2023: 1895-1908 - [c52]Hans Betke, Michaelle Bosse, Fotini Tzavala-Reusch, Stephan Kuehnel, Stefan Sackmann:
Towards a Taxonomy for Neighborhood Volunteering Management Platforms. Wirtschaftsinformatik 2023: 84 - [e2]Stephan Kuehnel, Ilja Nastjuk, Stefan Sackmann, Simon Trang:
Proceedings of the 3rd International Workshop on Current Information Security and Compliance Issues in Information Systems Research (CIISR 2023) Co-located with the 18th International Conference on Wirtschaftsinformatik (WI 2023), Paderborn, Germany, September 18, 2023. CEUR Workshop Proceedings 3512, CEUR-WS.org 2023 [contents] - 2022
- [j17]Johannes Damarowsky, Stephan Kühnel, Tobias Seyffarth, Stefan Sackmann:
Augmented Reality-Systeme zur Unterstützung der Workflow-Ausführung - Entwicklung und praktische Anwendung einer Taxonomie. HMD Prax. Wirtsch. 59(1): 54-77 (2022) - [c51]Stephan Kühnel, Stefan Sackmann, Johannes Damarowsky, Martin Böhmer:
EconBPC: A Tool for Activity-based Monetary Assessment and Visualization of Security and Compliance Measures in Business Processes. BPM (PhD/Demos) 2022: 127-131 - [c50]Christian Hrach, Rainer Alt, Stefan Sackmann:
Configuration Approach of User Requirements for Analytical Applications - Challenges, State of the Art and Evaluation. ISM@FedCSIS 2022: 3-22 - [c49]Christian Hrach, Rainer Alt, Stefan Sackmann:
Process-oriented documentation of user requirements for analytical applications - challenges, state of the art and evaluation of a service-based configuration approach. FedCSIS 2022: 773-782 - 2021
- [c48]Stephan Kühnel, Stefan Sackmann, Simon Trang, Ilja Nastjuk, Tizian Matschak, Laura Niedzela, Leonard Nake:
Towards a Business Process-based Economic Evaluation and Selection of IT Security Measures. CIISR@Wirtschaftsinformatik 2021: 7-21 - [e1]Stephan Kühnel, Stefan Sackmann, Simon Trang:
Proceedings of the First International Workshop on Current Compliance Issues in Information Systems Research (CIISR'21) Co-located with the 16th International Conference on Wirtschaftsinformatik (WI'21), Online (initially located in Duisburg-Essen, Germany), March 9th, 2021. CEUR Workshop Proceedings 2966, CEUR-WS.org 2021 [contents]
2010 – 2019
- 2019
- [c47]Tobias Seyffarth, Stephan Kühnel, Stefan Sackmann:
Business Process Compliance Despite Change: Towards Proposals for a Business Process Adaptation. CAiSE Forum 2019: 227-239 - [c46]Tigabu Dagne Akal, Tibebe Beshah, Stefan Sackmann, Solomon Negash:
Challenges of Identifying and Utilizing Big Data Analytics in a Resource-Constrained Environment: In the Case of Ethiopia. TDIT 2019: 234-254 - [c45]Sophie Gerstmann, Hans Betke, Stefan Sackmann:
Towards Automated Individual Communication for Coordination of Spontaneous Volunteers. ISCRAM 2019 - [c44]Sebastian Lindner, Stefan Sackmann, Hans Betke:
Simulating Spontaneous Volunteers: A System Entity Structure for Defining Disaster Scenarios. ISCRAM 2019 - 2018
- [c43]Tobias Seyffarth, Stephan Kühnel, Stefan Sackmann:
Business Process Compliance and Business Process Change: An Approach to Analyze the Interactions. BIS 2018: 176-189 - [c42]Stefan Sackmann, Stephan Kühnel, Tobias Seyffarth:
Using Business Process Compliance Approaches for Compliance Management with Regard to Digitization: Evidence from a Systematic Literature Review. BPM 2018: 409-425 - [c41]Sebastian Lindner, Stephan Kühnel, Hans Betke, Stefan Sackmann:
Simulating Spontaneous Volunteers - A Conceptual Model. ISCRAM 2018 - 2017
- [j16]Stephan Kühnel, Stefan Sackmann, Tobias Seyffarth:
Effizienzorientiertes Risikomanagement für Business Process Compliance. HMD Prax. Wirtsch. 54(1): 124-145 (2017) - [c40]Tobias Seyffarth, Stephan Kühnel, Stefan Sackmann:
A Taxonomy of Compliance Processes for Business Process Compliance. BPM (Forum) 2017: 71-87 - [c39]Hans Betke, Sebastian Lindner, Stefan Sackmann, Sophie Gerstmann:
Informationssysteme im Katastrophenmanagement. GI-Jahrestagung 2017: 1283-1296 - [c38]Tobias Seyffarth, Stephan Kühnel, Stefan Sackmann:
Welche Compliance-Anforderungen sind für Geschäftsprozessänderungen relevant? Ein Ansatz zur Modellierung der Beziehungen. GI-Jahrestagung 2017: 1641-1646 - [c37]Sebastian Lindner, Hans Betke, Stefan Sackmann:
Attributes for Simulating Spontaneous On-Site Volunteers. ISCRAM 2017 - 2016
- [c36]Günter Müller, Stefan Sackmann, Richard M. Zahoransky:
Vorwort. MKWI 2016: 1339 - [c35]Tobias Seyffarth, Stephan Kühnel, Stefan Sackmann:
ConFlex - An Ontology-Based Approach for the Flexible Integration of Controls into Business Processes. MKWI 2016: 1341-1352 - 2015
- [j15]Marlen Hofmann, Hans Betke, Stefan Sackmann:
Process-oriented disaster response management: a structured literature review. Bus. Process. Manag. J. 21(5): 966-987 (2015) - [c34]Marlen Hofmann, Hans Betke, Stefan Sackmann:
Automated Analysis and Adaptation of Disaster Response Processes with Place-Related Restrictions. ISCRAM 2015 - [c33]Marlen Hofmann, Stefan Sackmann, Hans Betke:
Using Precedence Diagram Method in Process-Oriented Disaster Response Management. ISCRAM 2015 - [p2]Stefan Sackmann, Kai Kittel:
Flexible Workflows and Compliance: A Solvable Contradiction?! BPM 2015: 247-258 - 2014
- [j14]Sven Wohlgemuth, Stefan Sackmann, Noboru Sonehara, A Min Tjoa:
Security and privacy in business networking. Electron. Mark. 24(2): 81-88 (2014) - [j13]Stephan Kühnel, Stefan Sackmann:
Effizienz Compliance-konformer Kontrollprozesse in internen Kontrollsystemen (IKS). HMD Prax. Wirtsch. 51(3): 252-266 (2014) - [j12]Marlen Hofmann, Hans Betke, Stefan Sackmann:
Hands2Help - Ein App-basiertes Konzept zur Koordination Freiwilliger Helfer/ Hands2Help - An App-based Concept for Coordination of Disaster Response Volunteers. i-com 13(1): 29-36 (2014) - [c32]Stefan Sackmann, Marlen Hofmann, Hans Betke:
Organizing On-Site Volunteers: An App-Based Approach. ARES 2014: 438-439 - [c31]Stefan Sackmann, Stefanie Rinderle-Ma:
Vorwort. MKWI 2014: 1159 - 2013
- [j11]Stefan Sackmann, Marlen Hofmann, Stephan Kühnel:
Return on Controls Invest. HMD Prax. Wirtsch. 289: 31-40 (2013) - [c30]Marlen Hofmann, Stefan Sackmann, Hans Betke:
Using Workflow Management Systems to Improve Disaster Response Processes. AINA Workshops 2013: 261-266 - [c29]Hans Betke, Kai Kittel, Stefan Sackmann:
Modeling Controls for Compliance - An Analysis of Business Process Modeling Languages. AINA Workshops 2013: 866-871 - [c28]Stefan Sackmann, Marlen Hofmann, Hans Betke:
PRIMA: A Model-Based Method for Analyzing Place-Related Information in Disaster Response Processes. AMCIS 2013 - [c27]Kai Kittel, Stefan Sackmann, Kevin Göser:
Flexibility and Compliance in Workflow Systems - The KitCom Prototype. CAiSE Forum 2013: 154-160 - [c26]Kai Kittel, Stefan Sackmann, Hans Betke, Marlen Hofmann:
Achieving Flexible and Compliant Processes in Disaster Management. HICSS 2013: 4687-4696 - [c25]Marlen Hofmann, Stefan Sackmann, Hans Betke:
A novel architecture for disaster response workflow management systems. ISCRAM 2013 - [c24]Stefan Sackmann, Marlen Hofmann, Hans Betke:
Towards the Integration of Place-related Information in Disaster Response Processes. ISCRAM 2013 - 2012
- [j10]Markus Ruch, Stefan Sackmann:
Integrating management of customer value and risk in e-commerce. Inf. Syst. E Bus. Manag. 10(1): 101-116 (2012) - [c23]Dennis Kundisch, Stefan Sackmann:
Vorwort. MKWI 2012: 807 - [c22]Kai Kittel, Stefan Sackmann:
Flexible Controls for Compliance in Catastrophe Management Processes. MKWI 2012: 1675-1688 - 2011
- [c21]Kai Kittel, Stefan Sackmann:
Gaining Flexibility and Compliance in Rescue Processes with BPM. ARES 2011: 639-644 - 2010
- [j9]Günter Müller, Rafael Accorsi, Sebastian Höhn, Stefan Sackmann:
Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten. Inform. Spektrum 33(1): 3-13 (2010) - [c20]Stefan Sackmann, Arnt Syring:
Adapted Loss Database - A New Approach to Assess IT Risk in Automated Business Processes. AMCIS 2010: 374 - [c19]Günter Müller, Dennis Kundisch, Stefan Sackmann, Frank Romeike:
Vorwort. MKWI 2010: 2123-2124
2000 – 2009
- 2009
- [c18]Markus Ruch, Stefan Sackmann:
Customer-Specific Transaction Risk Management in E-Commerce. AMCIS/SIGeBIZ 2009: 68-79 - [c17]Markus Ruch, Stefan Sackmann:
Customer Specific Transaction Risk Management in eCommerce. AMCIS 2009: 508 - [c16]Amy McDonough, Stefan Sackmann:
Compliance and Company Value: How Markets React to Reported Lapses in Corporate Governance. CEC 2009: 239-244 - [c15]Stefan Sackmann, Lutz Lowis, Kai Kittel:
A Risk Based Approach for Selecting Services in Business Process Execution. Wirtschaftsinformatik (1) 2009: 357-366 - 2008
- [j8]Stefan Sackmann, Dennis Kundisch, Markus Ruch:
CRM, Kundenbewertung und Risk-Return-Steuerung im betrieblichen Einsatz. HMD Prax. Wirtsch. 259: 21-31 (2008) - [j7]Stefan Sackmann:
Automatisierung von Compliance. HMD Prax. Wirtsch. 263: 39-46 (2008) - [j6]Stefan Sackmann, Martin Kähmer:
ExPDT: Ein Policy-basierter Ansatz zur Automatisierung von Compliance. Wirtschaftsinf. 50(5): 366-374 (2008) - [c14]Stefan Sackmann:
A Reference Model for Process-Oriented IT Risk Management. ECIS 2008: 1346-1357 - [c13]Dennis Kundisch, Stefan Sackmann, Markus Ruch:
CRM and Customer Portfolio Management for E-Tailers. HICSS 2008: 276 - [c12]Stefan Sackmann:
Assessing the effects of IT changes on IT risk - A business process-oriented view. Multikonferenz Wirtschaftsinformatik 2008 - [c11]Stefan Sackmann, Martin Kähmer, Maike Gilliot, Lutz Lowis:
A Classification Model for Automating Compliance. CEC/EEE 2008: 79-86 - 2007
- [j5]Günter Müller, Stefan Sackmann, Oliver Günther, Sarah Spiekermann:
Personalisierung und informationelle Selbstbestimmung Ein unauflösbarer Widerspruch? Wirtschaftsinf. 49(1): 1-2 (2007) - [c10]Dennis Kundisch, Stefan Sackmann, Markus Ruch:
Transferring Portfolio Selection Theory to Customer Portfolio Management - The Case of an e-Tailer. FinanceCom 2007: 32-49 - [c9]Stefan Sackmann:
Personalization and Privacy in Ubiquitous Computing - Resolving the Conflict by Legally Binding Commitments. CEC/EEE 2007: 447-450 - 2006
- [j4]Stefan Sackmann, Jens Strüker, Rafael Accorsi:
Personalization in privacy-aware highly dynamic systems. Commun. ACM 49(9): 32-38 (2006) - 2004
- [j3]Stefan Sackmann:
Bilaterale Preisverhandlungen von Software-Agenten. Künstliche Intell. 18(2): 37- (2004) - [c8]Stefan Sackmann:
Bilateral Price Negotiations by Software Agents - A Model for Measuring Marketplace-Related Negotiation Behavior. AMCIS 2004: 216 - [c7]Jens Strueker, Stefan Sackmann:
New Forms of Customer Communication: Concepts and Pilot Projects. AMCIS 2004: 341 - [c6]Jens Strüker, Stefan Sackmann, Günter Müller:
Case Study on Retail Customer Communication Applying Ubiquitous Computing. CEC 2004: 42-48 - 2003
- [b1]Stefan Sackmann:
Bilaterale Preisverhandlungen von Software-Agenten: ein Modell und System zur Analyse des marktplatzspezifischen Verhandlungsspielraumes. University of Freiburg, Freiburg im Breisgau, Germany, Dt. Univ.-Verlag 2003, ISBN 978-3-8244-7853-8, pp. 1-190 - [j2]Torsten Eymann, Stefan Sackmann, Günter Müller:
Hayeks Katallaxie - Ein zukunftsweisendes Konzept für die Wirtschaftsinformatik? Wirtschaftsinf. 45(5): 491-496 (2003) - [c5]Torsten Eymann, Stefan Sackmann, Günter Müller, Ingo Pippow:
Hayek's Catallaxy: A Forward-Looking Concept for Information Systems? AMCIS 2003: 234 - [c4]Stefan Sackmann:
Automatisierte Erkennung von marktplatzspezifischem Verhandlungsverhalten. Wirtschaftsinformatik (1) 2003: 193-214 - 2002
- [j1]Boris Padovan, Stefan Sackmann, Torsten Eymann, Ingo Pippow:
A Prototype for an Agent-Based Secure Electronic Marketplace Including Reputation-Tracking Mechanisms. Int. J. Electron. Commer. 6(4): 93-113 (2002) - [c3]Stefan Sackmann, Torsten Eymann, Günter Müller:
EMIKA - Real-Time Controlled Mobile Information Systems in Health Care Applications. Mobile Computing in Medicine 2002: 151-158 - [p1]Holger Eggs, Stefan Sackmann, Torsten Eymann, Günter Müller:
Vertrauen und Reputation in P2P-Netzwerken. Peer-to-Peer: Ökonomische, technische und juristische Perspektiven 2002: 229-254 - 2001
- [c2]Boris Padovan, Stefan Sackmann, Torsten Eymann, Ingo Pippow:
A Prototype for an Agent based Secure Electronic Marketplace Including Reputation Tracking Mechanisms. HICSS 2001 - [c1]Boris Padovan, Stefan Sackmann, Torsten Eymann, Ingo Pippow, Holger Eggs:
Automatisierte Reputationsverfolgung auf einem agentenbasierten elektronischen Marktplatz. Wirtschaftsinformatik 2001: 38
Coauthor Index
aka: Stephan Kuehnel
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-13 17:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint