Empowerment and BYOx: towards improved IS security compliance

Titel: Empowerment and BYOx: towards improved IS security compliance / Maximilian von Welck, Manuel Trenz, Tina Blegind Jensen, Daniel Veit
Verfasser: ; ; ;
Veröffentlicht: Augsburg ˜[u.a.]œ : Universität Augsburg˜[u.a.]œ, 2017
Umfang: Online-Ressource
Format: E-Book
Sprache: Englisch
Kein Bild verfügbar
X
alg: 47657107
001A    $06000:04-03-21 
001B    $01999:29-05-25 $t02:28:46.000 
001D    $06000:04-03-21 
001U    $0utf8 
001X    $00 
002@    $0Oax 
002C    $aText $btxt $2rdacontent 
002D    $aComputermedien $bc $2rdamedia 
002E    $aOnline-Ressource $bcr $2rdacarrier 
003@    $0476571073 
004U    $0urn:nbn:de:bvb:384-opus4-397767 
006G    $01226666396 
006U    $021,O03 $f20210208 
007A    $01226666396 $aDNB 
009Q    $uhttps://nbn-resolving.org/urn:nbn:de:bvb:384-opus4-397767 $xR 
009Q    $qapplication/pdf $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $xH 
009Q    $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $xH 
010@    $aeng 
011@    $a2017 $n2017 
021A    $aEmpowerment and BYOx: towards improved IS security compliance $hMaximilian von Welck, Manuel Trenz, Tina Blegind Jensen, Daniel Veit 
028A    $BVerfasser $4aut $8Welck, Maximilian$cvon$Z20./21. Jh. [Tp1] $9453783317 
028C    $aTrenz $BVerfasser $dManuel $4aut 
028C    $aBlegind Jensen $BVerfasser $dTina $4aut 
028C    $BVerfasser $#Veit, Daniel $#Veit, Daniel Julian Salvador $4aut $7124520138 $8Veit, Daniel J.$Z1975- [Tp1] $9155185349 
033A    $pAugsburg {[u.a.] $nUniversität Augsburg{[u.a.] 
034D    $aOnline-Ressource 
037A    $aIn: Proceedings of the 38th International Conference on Information Systems (ICIS2017), December 10-13, 2017, Seoul, South Korea, S. 23- 
045E    $c320 

lok: 47657107 3

exp: 47657107 3 1 #EPN
201B/01 $004-03-21 $t23:07:56.612 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145426891 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 5

exp: 47657107 5 1 #EPN
201B/01 $004-03-21 $t23:07:56.617 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145426905 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 8

exp: 47657107 8 1 #EPN
201B/01 $004-03-21 $t23:07:56.622 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145426913 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 10

exp: 47657107 10 1 #EPN
201B/01 $004-03-21 $t23:07:56.627 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145426921 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 11

exp: 47657107 11 1 #EPN
201B/01 $004-03-21 $t23:07:56.644 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $0114542693X 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 20

exp: 47657107 20 1 #EPN
201B/01 $004-03-21 $t23:07:56.648 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145426948 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 21

exp: 47657107 21 1 #EPN
201B/01 $004-03-21 $t23:07:56.653 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145426956 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 23

exp: 47657107 23 1 #EPN
201B/01 $004-03-21 $t23:07:56.658 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145426964 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 24

exp: 47657107 24 1 #EPN
201B/01 $004-03-21 $t23:07:56.663 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145426972 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 25

exp: 47657107 25 1 #EPN
201B/01 $004-03-21 $t23:07:56.668 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145426980 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 36

exp: 47657107 36 1 #EPN
201B/01 $029-05-25 $t02:28:46.011 
201C/01 $029-05-25 
201U/01 $0utf8 
203@/01 $01304993469 
208@/01 $a29-05-25 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 49

exp: 47657107 49 1 #EPN
201B/01 $004-03-21 $t23:07:56.672 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145426999 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 54

exp: 47657107 54 1 #EPN
201B/01 $004-03-21 $t23:07:56.682 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145427014 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 108

exp: 47657107 108 1 #EPN
201B/01 $004-03-21 $t23:07:56.691 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145427030 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 204

exp: 47657107 204 1 #EPN
201B/01 $004-03-21 $t23:07:56.699 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145427049 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH 

lok: 47657107 205

exp: 47657107 205 1 #EPN
201B/01 $004-03-21 $t23:07:56.704 
201C/01 $004-03-21 
201U/01 $0utf8 
203@/01 $01145427057 
208@/01 $a04-03-21 $bl 
209S/01 $S0 $uhttps://aisel.aisnet.org/icis2017/Security/Presentations/23/ $XH 
209S/01 $S0 $uhttps://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776 $XH
LEADER 00000cam a22000002c 4500
001 476571073
003 DE-603
005 20250529022846.0
007 cr||||||||||||
008 210304s2017 xx |||| o| u00||u|eng
015 |a 21,O03  |2 dnb 
016 7 |2 DE-101  |a 1226666396 
024 7 |a urn:nbn:de:bvb:384-opus4-397767  |2 urn 
035 |a (DE-599)DNB1226666396 
040 |a DE-603  |b ger  |c DE-603  |d DE-603 
041 |a eng 
084 |a 320  |q DE-101  |2 sdnb 
100 1 |a Welck, Maximilian von  |d 20./21. Jh.  |e Verfasser  |4 aut  |0 (DE-603)453783317  |0 (DE-588)1196144680  |2 gnd 
245 0 0 |a Empowerment and BYOx: towards improved IS security compliance  |c Maximilian von Welck, Manuel Trenz, Tina Blegind Jensen, Daniel Veit 
264 1 |a Augsburg ˜[u.a.]œ  |b Universität Augsburg˜[u.a.]œ  |c 2017 
300 |a Online-Ressource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a In: Proceedings of the 38th International Conference on Information Systems (ICIS2017), December 10-13, 2017, Seoul, South Korea, S. 23- 
700 1 |a Trenz, Manuel  |e Verfasser  |4 aut 
700 1 |a Blegind Jensen, Tina  |e Verfasser  |4 aut 
700 1 |a Veit, Daniel J.  |d 1975-  |e Verfasser  |4 aut  |0 (DE-603)155185349  |0 (DE-588)124520138  |2 gnd 
856 |u https://nbn-resolving.org/urn:nbn:de:bvb:384-opus4-397767  |x Resolving-System 
856 |q application/pdf  |u https://aisel.aisnet.org/icis2017/Security/Presentations/23/  |x Verlag  |z kostenfrei 
856 |u https://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/39776  |x Verlag  |z kostenfrei 
924 1 |9 603  |a (DE-603)1145426891  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145426905  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145426913  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145426921  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)114542693X  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145426948  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145426956  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145426964  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145426972  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145426980  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1304993469  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145426999  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145427014  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145427030  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145427049  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1145427057  |b DE-603  |c HES  |d d