default search action
Tizian Matschak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c12]Tizian Matschak, Ilja Nastjuk, Laura Niedzela, Stephan Kuehnel, Simon Trang:
A Process-Based Approach to Information Security Investment Evaluation: Design, Implementation, and Evaluation. AMCIS 2023 - [c11]Laura Niedzela, Stephan Kuehnel, Ilja Nastjuk, Tizian Matschak, Stefan Sackmann, Simon Trang:
A Qualitative Study on Acceptance Factors of Economic Approaches on IT Security Investment Decisions. AMCIS 2023 - [c10]Theresa Pfaff, Ilja Nastjuk, Tizian Matschak:
Applying Dispositional, Situational, and Organizational Risk Propensity to Technology Threat Avoidance Theory - A tripartite View. ECIS 2023 - [c9]Aycan Aslan, Tizian Matschak, Maike Greve, Simon Trang, Lutz M. Kolbe:
At What Price? Exploring the Potential and Challenges of Differentially Private Machine Learning for Healthcare. HICSS 2023: 3277-3286 - [c8]Gilbert Georg Hövel, Tizian Matschak:
How to Foster Compliance in Non-Integrated IT-Landscapes? The Case of Manual Medical Data Transfers. CIISR@Wirtschaftsinformatik 2023: 77-84 - 2022
- [c7]Tizian Matschak, Florian Rampold, Malte Hellmeier, Christoph Prinz, Simon Trang:
A Digitization Pipeline for Mixed-Typed Documents Using Machine Learning and Optical Character Recognition. DESRIST 2022: 195-207 - [c6]Tizian Matschak, Simon Trang, Christoph Prinz:
A Taxonomy of Machine Learning-based Fraud Detection Systems. ECIS 2022 - [c5]Tizian Matschak, Christoph Prinz, Florian Rampold, Simon Trang:
Show Me Your Claims and I'll Tell You Your Offenses: Machine Learning-Based Decision Support for Fraud Detection on Medical Claim Data. HICSS 2022: 1-9 - [c4]Tizian Matschak, Theresa Pfaff:
The Role of Situational Risk Propensity in Technology Threat Avoidance Behavior. Wirtschaftsinformatik 2022 - [c3]Laura Niedzela, Leonard Nake, Tizian Matschak:
Categories of Approaches for IT Security Investment Decisions: A systematic literature review. Wirtschaftsinformatik 2022 - 2021
- [c2]Tizian Matschak, Christoph Prinz, Kristin Masuch, Simon Trang:
Healthcare in Fraudster's Crosshairs: Designing, Implementing and Evaluating a Machine Learning Approach for Anomaly Detection on Medical Prescription Claim Data. PACIS 2021: 89 - [c1]Stephan Kühnel, Stefan Sackmann, Simon Trang, Ilja Nastjuk, Tizian Matschak, Laura Niedzela, Leonard Nake:
Towards a Business Process-based Economic Evaluation and Selection of IT Security Measures. CIISR@Wirtschaftsinformatik 2021: 7-21
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-13 18:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint