default search action
Stephanie Teufel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2018
- [j9]Antoni Wiercioch, Stephanie Teufel, Bernd Teufel:
The Authentication Dilemma. J. Commun. 13(8): 443-449 (2018) - [j8]Antoni Wiercioch, Stephanie Teufel, Bernd Teufel:
The Authentication Dilemma. J. Softw. 13(5): 277-286 (2018) - 2010
- [j7]Patrick S. Merten, Martin Steinert, Stephanie Teufel:
Mobile Business in Air Travel: Results from an Explorative Workshop. J. Inf. Technol. Tour. 12(1): 65-88 (2010) - 2006
- [j6]Peter Windemann, Thomas Schlienger, Stephanie Teufel:
Messung der Informationssicherheit auf der Ebene der Sicherheitspolitik. HMD Prax. Wirtsch. 248 (2006) - 2004
- [j5]Michael Matousek, Thomas Schlienger, Stephanie Teufel:
Metriken und Konzepte zur Messung der Informationssicherheit. HMD Prax. Wirtsch. 236 (2004) - 2003
- [j4]Thomas Schlienger, Stephanie Teufel:
Information security culture - from analysis to change. South Afr. Comput. J. 31: 46-52 (2003) - 2000
- [j3]Stephanie Teufel, Thomas Schlienger:
Informationssicherheit - Wege zur kontrollierten Unsicherheit. HMD Prax. Wirtsch. 216: 18-31 (2000) - 1996
- [j2]Jan H. P. Eloff, Ralph Holbein, Stephanie Teufel:
Security classification for documents. Comput. Secur. 15(1): 55-71 (1996) - 1995
- [j1]Christian Sauter, Thomas Mühlherr, Stephanie Teufel:
Forschungsprojekt STRATUM: Strategisches Management - Methoden, Techniken und Werkzeuge zur Unterstützung kooperativer Aufgaben. Inform. Forsch. Entwickl. 10(3): 163-165 (1995)
Conference and Workshop Papers
- 2019
- [c26]Joëlle Simonet, Stephanie Teufel:
The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users. SEC 2019: 194-208 - 2017
- [c25]Mohammad Aldabbas, Stephanie Teufel, Bernd Teufel:
The importance of security culture for crowd energy systems. ISSA 2017: 10-15 - 2015
- [c24]Stephanie Teufel, Bernd Teufel:
Crowd Energy Information Security Culture - Security Guidelines for Smart Environments. SmartCity 2015: 123-128 - 2012
- [c23]Caroline Oehri, Stephanie Teufel:
Social media security culture. ISSA 2012: 1-5 - 2008
- [c22]Patrick S. Merten, Stephanie Teufel:
Technological Innovations in the Passenger Process of the Airline Industry: A Hypotheses Generating Explorative Study. ENTER 2008: 348-358 - [c21]Jan Schlüter, Stephanie Teufel:
secalyser - a system to plan training for employees. HAISA 2008: 24-34 - [c20]Jan Schlüter, Birgit Novy, Jorge Marx Gómez, Stephanie Teufel:
Automatisierte Erstellung von Wissensbilanzen. Multikonferenz Wirtschaftsinformatik 2008 - 2005
- [c19]Thomas Schlienger, Stephanie Teufel, Raphael Rues:
Information Security Culture - Status Quo in Switzerland. ISSA 2005 - [c18]Martin Steinert, Stephanie Teufel:
The European Mobile Data Service Dilemma - An empirical analysis on the barriers of implementing mobile data services. MOBIS 2005: 63-78 - [c17]Thomas Schlienger, Stephanie Teufel:
Tool Supported Management of Information Security Culture. SEC 2005: 65-78 - 2003
- [c16]Thomas Schlienger, Stephanie Teufel:
Analyzing Information Security Culture: Increased Trust by an Appropriate Information Security Culture. DEXA Workshops 2003: 405-409 - [c15]Stephanie Teufel, Andreas Erat:
Personalisierung im Freiburger ICT-Management Framework. Wirtschaftsinformatik (1) 2003: 509-530 - 2002
- [c14]Thomas Schlienger, Stephanie Teufel:
Information Security Culture: The Socio-Cultural Dimension in Information Security Management. SEC 2002: 191-202 - 2000
- [c13]Ulrich Ultes-Nitsche, Stephanie Teufel:
Secure Access to Medical Data over the Internet. ECIS 2000: 1331-1340 - 1999
- [c12]Konstantin Knorr, Pino Calzo, Susanne Röhrig, Stephanie Teufel:
Prozeßmodellierung im Krankenhaus. Wirtschaftsinformatik 1999: 26 - 1998
- [c11]Othmar Morger, Ulrich Nitsche, Stephanie Teufel:
Privacy and Efficiency in Patient Focused Health Care Processes. MedInfo 1998: 1143-1147 - 1997
- [c10]Othmar Morger, Ulrich Nitsche, Stephanie Teufel:
Security Concerns for Mobile Information Systems in Health Care. DEXA Workshop 1997: 312-317 - [c9]Ralph Holbein, Stephanie Teufel, Othmar Morger, Kurt Bauknecht:
A comprehensive need-to-know access control system and its application for medical information systems. SEC 1997: 403-414 - 1996
- [c8]Ralph Holbein, Stephanie Teufel, Kurt Bauknecht:
The use of business process models for security design in organisations. SEC 1996: 13-22 - 1995
- [c7]Ralph Holbein, Stephanie Teufel, Kurt Bauknecht:
A Formal Security Design Approach for Information Exchange in Organisations. DBSec 1995: 267-285 - [c6]Stephanie Teufel, Jan H. P. Eloff, Kurt Bauknecht, Dimitris Karagiannis:
Information Security Concepts in Computer Supported Cooperative Work. DEXA 1995: 621-631 - [c5]Christian Sauter, Othmar Morger, Thomas Mühlherr, Andrew Hutchison, Stephanie Teufel:
CSCW for Strategic Management in Swiss Enterprises: an Empirical Study. ECSCW 1995: 115- - [c4]Andrew Hutchison, Othmar Morger, Christian Sauter, Stephanie Teufel:
Current Usage and Potential of Computer Supported Cooperative Work in Swiss Banks: An Empirical Study. ICIS 1995: 313-324 - 1994
- [c3]Volker Stadler, Patrick Scheidegger, Stephanie Teufel:
'Strategie Allignment' als Voraussetzung für die Gestaltung von Informationsflüssen in Geschäftsprozessen. ISI 1994: 174-186 - [c2]Christian Sauter, Thomas Mühlherr, Stephanie Teufel:
Sozio-kulturelle Auswirkungen von Groupware: Ein Ansatz zur Adaption und Operationalisierung eines sozialpsychologischen Modells für die Gestaltung und den Einsatz von Groupware. ISI 1994: 517-526 - [c1]Ralph Holbein, Stephanie Teufel:
Informationsmissbrauch - Ein Sicherheitsproblem und ein Lösungsansatz für die Informationsverarbeitung in Unternehmen. ISI 1994: 536-548
Editorship
- 2014
- [e1]Stephanie Teufel, A Min Tjoa, Ilsun You, Edgar R. Weippl:
Availability, Reliability, and Security in Information Systems - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings. Lecture Notes in Computer Science 8708, Springer 2014, ISBN 978-3-319-10974-9 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint