PUMA publications for /user/jmleimeister/IShttps://puma.uni-kassel.de/user/jmleimeister/ISPUMA RSS feed for /user/jmleimeister/IS2024-03-29T11:38:02+01:00Die Bedeutung von nationaler Kultur für die Gestaltung von Informationssystemenhttps://puma.uni-kassel.de/bibtex/29ce6d060aefc8cd83b6d8c7d22f66d4a/jmleimeisterjmleimeister2012-11-29T11:28:14+01:00IS Informationssysteme itegpub kultur pub_jml <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="T.-F. Kummer" itemprop="url" href="/author/T.-F.%20Kummer"><span itemprop="name">T. Kummer</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Bick" itemprop="url" href="/author/M.%20Bick"><span itemprop="name">M. Bick</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>WIRTSCHAFTSINFORMATIK</em></span></span> <em><span itemtype="http://schema.org/PublicationVolume" itemscope="itemscope" itemprop="isPartOf"><span itemprop="volumeNumber">54 </span></span>(<span itemprop="issueNumber">6</span>):
<span itemprop="pagination">303-318</span></em> </span>(<em><span>Dezember 2012<meta content="Dezember 2012" itemprop="datePublished"/></span></em>)<em>368.</em>Thu Nov 29 11:28:14 CET 2012WIRTSCHAFTSINFORMATIKDecember 20123686303-318Die Bedeutung von nationaler Kultur für die Gestaltung von Informationssystemen542012IS Informationssysteme itegpub kultur pub_jml Open security issues in German healthcare telematicshttps://puma.uni-kassel.de/bibtex/2c24c956a2d2f5471cfa7c8637baa2cd0/jmleimeisterjmleimeister2010-03-09T15:33:24+01:00Analysis Card Electronic Health Healthcare IS Information Security Systems Telematics itegpub pub_jml <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Sunyaev" itemprop="url" href="/author/A.%20Sunyaev"><span itemprop="name">A. Sunyaev</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Krcmar" itemprop="url" href="/author/H.%20Krcmar"><span itemprop="name">H. Krcmar</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">3. International Conference on Health Informatics (HealthInf) 2010</span>, </em></span><em>Valencia, Spain, </em>(<em><span>2010<meta content="2010" itemprop="datePublished"/></span></em>)<em>162 (10-10).</em>Tue Mar 09 15:33:24 CET 2010Valencia, Spain3. International Conference on Health Informatics (HealthInf) 2010162 (10-10)Open security issues in German healthcare telematics2010Analysis Card Electronic Health Healthcare IS Information Security Systems Telematics itegpub pub_jml Characteristics of IS security approaches with respect to healthcarehttps://puma.uni-kassel.de/bibtex/2dc65d3a0e369d9c470fa38c32bbff598/jmleimeisterjmleimeister2010-01-28T15:31:38+01:00Characteristics HealthCare IS Information Security itegpub pub_jml <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Sunyaev" itemprop="url" href="/author/A.%20Sunyaev"><span itemprop="name">A. Sunyaev</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Atherton" itemprop="url" href="/author/M.%20Atherton"><span itemprop="name">M. Atherton</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="C. Mauro" itemprop="url" href="/author/C.%20Mauro"><span itemprop="name">C. Mauro</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Krcmar" itemprop="url" href="/author/H.%20Krcmar"><span itemprop="name">H. Krcmar</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">Proceedings of the Fifteenth Americas Conference on Information Systems (AMCIS)</span>, </em></span><em>San Francisco, USA, </em>(<em><span>2009<meta content="2009" itemprop="datePublished"/></span></em>)<em>129 (13-09).</em>Thu Jan 28 15:31:38 CET 2010San Francisco, USAProceedings of the Fifteenth Americas Conference on Information Systems (AMCIS)129 (13-09)Characteristics of IS security approaches with respect to healthcare2009Characteristics HealthCare IS Information Security itegpub pub_jml