default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 19 matches
- 2019
- Annika Andreasson, Fredrik Blix:
"Special Commando Move" - When Informal, Formal and Technical Cybersecurity Components Fail. STPIS@ECIS 2019: 26-33 - Ilia Bider, Gil Regev, Erik Perjons:
Linking Autopoiesis to Homeostasis in Socio-Technical Systems. STPIS@ECIS 2019: 160-170 - Peter Imrie, Peter M. Bednar:
A theoretical model for the Virtual Personal Assistant. STPIS@ECIS 2019: 156-159 - Markus Jelonek, Thomas Herrmann:
Reconsidering Design Aspects for Socio-Technical Health Care Based on Experiences with an Ethnographical Study of Intensive Home Care. STPIS@ECIS 2019: 110-122 - Joakim Kävrestad, Rose-Mharie Åhlfeldt, Marcus Nohlberg, Johani Karonen, Stewart Kowalski:
Spiraling out in control: A Video Cartesian Dialectic on a Socio-technical Approach to Teaching Privacy, Information- and Cyber Security (PICS). STPIS@ECIS 2019: 153-155 - Martin Koch, Kent Illemann, Daniel Riddarvinge:
Strategic Planning for Secure Digital Transformation: A Socio-Technical Approach. STPIS@ECIS 2019: 34-41 - Paola Mauri:
Action Research on Process Analysis Maps. What Does an Arrow Mean? STPIS@ECIS 2019: 137-148 - Richard McEvoy, Stewart Kowalski:
Cassandra's Calling Card: Socio-technical Risk Analysis and Management in Cyber Security Systems. STPIS@ECIS 2019: 65-80 - Mariusz Nowostawski, Christopher Frantz:
Quasi-Social: Software as the 'Social' in Socio-Technical Design. STPIS@ECIS 2019: 42-53 - Grethe Østby, Lars Berg, Mazaher Kianpour, Basel Katt, Stewart Kowalski:
A Socio-Technical Framework to Improve Cyber Security Training: A Work in Progress. STPIS@ECIS 2019: 81-96 - Björn Persson:
A Case of Trapeza. STPIS@ECIS 2019: iv-v - Mikko Rajanen, Dorina Rajanen:
Usability: A Core Concept in Socio-Technical Systems Development. STPIS@ECIS 2019: 9-16 - Masood Rangraz, Lena Pareto:
Robotics and Quality: A Sociomaterial Analysis of Assembly Line. STPIS@ECIS 2019: 123-136 - Bilal Al Sabbagh:
Bringing Socio-Technical Security Capabilities to Cyber Range Programs. STPIS@ECIS 2019: 149-152 - Charlotte A. Shahlaei, Ulrika Lundh Snis, Dick Stenmark:
Organizing in The Age of Digital Product Platforms: The Work of Integrated Vehicle Control Engineers. STPIS@ECIS 2019: 17-25 - Namchul Shin:
Creating Shared Value from Collaborative Logistics Systems: The Cases of ES3 and Flexe. STPIS@ECIS 2019: 97-109 - Tristan Stull, Jean-Pierre Kuilboer:
Three Languages for Urban Mobility. STPIS@ECIS 2019: 54-64 - Lars Taxén:
Reviving the Individual in Sociotechnical Systems Thinking. STPIS@ECIS 2019: 1-8 - Stewart Kowalski, Peter M. Bednar, Alexander Nolte, Ilia Bider:
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), Stockholm, Sweden, June 10, 2019. CEUR Workshop Proceedings 2398, CEUR-WS.org 2019 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-29 13:16 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint