default search action
Thomas Widjaja
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Eleunthia Wong Ellinger, Robert Wayne Gregory, Tobias Mini, Thomas Widjaja, Ola Henfridsson:
Skin in the Game: The Transformational Potential of Decentralized Autonomous Organizations. MIS Q. 48(1): 245-272 (2024) - [c45]Martin Richthammer, Thomas Widjaja:
Assuring or Enabling Privacy? - How Different Types of Regulatory Measures for Data Privacy Affect Individual Disclosure Behavior. ECIS 2024 - [c44]Hanna Roider, Thomas Widjaja:
Uncovering Privacy in the Metaverse from an Identity Perspective: A Literature Review. ICIS 2024 - 2023
- [c43]Abdul Muqeet Ghaffar, Thomas Widjaja:
Framing as an App-Design Measure to Nudge Users Toward Infection Disclosure in Contact-Tracing Applications. ECIS 2023 - [c42]Martin Richthammer, Thomas Widjaja:
The effect of regulatory Measures on Individual Data Disclosure: a Country Comparison. ECIS 2023 - [c41]Abdul Muqeet Ghaffar, Thomas Widjaja:
Towards a Theory to Explain Prosocial Data Disclosure - An Explorative Investigation of the Antecedents of Infection Disclosure. ICIS 2023 - [c40]Abdul Muqeet Ghaffar, Thomas Widjaja, Hanna Roider:
Towards a Theory to Explain the Effect of Uncertainty on Prosocial Data Disclosure. ICIS 2023 - 2022
- [c39]Sebastian Overhage, Thomas Widjaja:
A Taxonomy of Forks in the Context of Decentralized Autonomous Organizations. ECIS 2022 - [c38]Philipp Sleziona, Thomas Widjaja:
Transparency in the Privacy Context: A Structured Literature Review. ECIS 2022 - 2021
- [c37]Tobias Mini, Eleunthia Wong Ellinger, Robert Wayne Gregory, Thomas Widjaja:
An Exploration of Governing via IT in Decentralized Autonomous Organizations. ICIS 2021 - 2020
- [j10]Thomas Widjaja, Robert Wayne Gregory:
Monitoring the Complexity of IT Architectures: Design Principles and an IT Artifact. J. Assoc. Inf. Syst. 21(3): 4 (2020)
2010 – 2019
- 2019
- [c36]Tobias Mini, Thomas Widjaja:
Tensions in Digital Platform Business Models: A Literature Review. ICIS 2019 - [c35]Tobias Steudner, Thomas Widjaja, Jan H. Schumann:
An Exploratory Study of Risk Perception for Data Disclosure to a Network of Firms. Wirtschaftsinformatik 2019: 1352-1357 - 2018
- [c34]Torben Stoffer, Thomas Widjaja, Nicolas Zacharias:
The Effect of Service Modularity on Flexibility in the Digital Age - An Investigation in the B2B Context. IESS 2018: 3-15 - [c33]Torben Stoffer, Thomas Widjaja, Nicolas Zacharias:
The Diverging Effect of Digitalization on Perceived Relational Conflict during Service Provisions " An Empirical Comparison of Suppliers and Customers in the B2B Context. ICIS 2018 - 2017
- [j9]Susanne Strahringer, Thomas Widjaja:
IT-Management und IT-Strategie. HMD Prax. Wirtsch. 54(3): 297-299 (2017) - [c32]Moritz Becker, Christian Matt, Thomas Widjaja, Thomas Hess:
Understanding Privacy Risk Perceptions of Consumer Health Wearables - An Empirical Taxonomy. ICIS 2017 - [c31]Adrian Engelbrecht, Jin P. Gerlach, Thomas Widjaja, Peter Buxmann:
The Nature of Enterprise-Service-Fit in the Context of Digital Services. ICIS 2017 - 2016
- [c30]Hendrik Brakemeier, Thomas Widjaja, Peter Buxmann:
Calculating with Different Goals in Mind - the Moderating Role of the regulatory Focus in the Privacy Calculus. ECIS 2016: Research Paper 124 - [c29]Adrian Engelbrecht, Jin Gerlach, Thomas Widjaja:
Understanding the Anatomy of Data-Driven Business Models - towards an Empirical Taxonomy. ECIS 2016: Research Paper 128 - [c28]Hendrik Brakemeier, Thomas Widjaja, Peter Buxmann:
Distinguishing Usage and Disclosure Intentions in Privacy Research: How our two Selves Bring about differences in the effects of Benefits and Risks. ECIS 2016: Research Paper 144 - 2015
- [j8]Hanna Krasnova, Thomas Widjaja, Peter Buxmann, Helena Wenninger, Izak Benbasat:
Research Note - Why Following Friends Can Hurt You: An Exploratory Investigation of the Effects of Envy on Social Networking Sites among College-Age Users. Inf. Syst. Res. 26(3): 585-605 (2015) - [j7]Jin Gerlach, Thomas Widjaja, Peter Buxmann:
Handle with care: How online social network providers' privacy policies impact users' information sharing behavior. J. Strateg. Inf. Syst. 24(1): 33-43 (2015) - 2014
- [c27]André Loske, Thomas Widjaja, Alexander Benlian, Peter Buxmann:
Perceived IT Security Risks in Cloud Adoption: the Role of Perceptual Incongruence between Users and Providers. ECIS 2014 - [c26]Thomas Widjaja:
Der kostenoptimale Grad funktionaler Redundanz in IT-Anwendungslandschaften. GI-Jahrestagung 2014: 1539-1552 - 2013
- [j6]Jan Christian Lang, Thomas Widjaja:
OREX-J: towards a universal software framework for the experimental analysis of optimization algorithms. OR Spectr. 35(3): 735-769 (2013) - [c25]Hanna Krasnova, Nicole Eling, Oleg Schneider, Helena Wenninger, Thomas Widjaja, Peter Buxmann:
Does This App Ask For Too Much Data? The Role Of Privacy Perceptions In User Behavior Towards Facebook Applications And Permission Dialogs. ECIS 2013: 179 - [c24]Alexander Schütz, Thomas Widjaja, Jasmin Kaiser:
Complexity In Enterprise Architectures - Conceptualization And Introduction Of A Measure From A System Theoretic Perspective. ECIS 2013: 202 - [c23]Christian Schmidt, Thomas Widjaja, Alexander Schütz:
Messung der Komplexität von IT-Landschaften auf der Basis von Architektur-Metamodellen: Ein generischer Ansatz und dessen Anwendung im Rahmen der Architektur-Transformation. GI-Jahrestagung 2013: 1261-1275 - [c22]Jasmin Kaiser, Thomas Widjaja, Peter Buxmann:
Relative and Joint Dependence in IS Outsourcing Relationships - A Model of Effects on Relational Facets and Exchange Performance. Global Sourcing Workshop 2013: 18-34 - [c21]Tobias Draisbach, Thomas Widjaja, Peter Buxmann:
Lock-Ins in Network Effect Markets - Results of a Simulation Study. HICSS 2013: 1464-1473 - [c20]Tobias Ackermann, Thomas Widjaja, Peter Buxmann:
Towards the Optimal Security Level: Quantification of Risks in Service-Based Information Systems. HICSS 2013: 3038-3047 - [c19]Jasmin Kaiser, Thomas Widjaja, Peter Buxmann:
A Two-Sided Perspective on Supplier Dependence in IS Outsourcing Dyads. HICSS 2013: 4709-4718 - [c18]Nicole Eling, Hanna Krasnova, Thomas Widjaja, Peter Buxmann:
Will You Accept an App? Empirical Investigation of the Decisional Calculus Behind the Adoption of Applications on Facebook. ICIS 2013 - [c17]Jasmin Kaiser, Thomas Widjaja, Peter Buxmann:
Unfolding Dyadic Dependencies in IS Outsourcing Relationships - Development of Two Multidimensional Constructs. ICIS 2013 - [c16]André Loske, Thomas Widjaja, Peter Buxmann:
Cloud Computing Providers' Unrealistic Optimism regarding IT Security Risks: A Threat to Users? ICIS 2013 - [c15]Alexander Schütz, Thomas Widjaja, Robert Wayne Gregory:
Escape from Winchester Mansion - Toward a Set of Design Principles to Master Complexity in IT Architectures. ICIS 2013 - [c14]André Loske, Thomas Widjaja, Peter Buxmann:
Unrealistischer Optimismus der Cloud Computing Anbieter bezüglich IT Sicherheitsrisiken - Eine Bedrohung für die Nutzer? Wirtschaftsinformatik 2013: 65 - [c13]Hanna Krasnova, Helena Wenninger, Thomas Widjaja, Peter Buxmann:
Envy on Facebook: A Hidden Threat to Users' Life Satisfaction? Wirtschaftsinformatik 2013: 92 - 2012
- [j5]Christoph Burkard, Thomas Widjaja, Peter Buxmann:
Software Ecosystems. Bus. Inf. Syst. Eng. 4(1): 41-44 (2012) - [j4]Christoph Burkard, Thomas Widjaja, Peter Buxmann:
Software Ecosystems. Wirtschaftsinf. 54(1): 43-47 (2012) - [j3]Helena Wenninger, Thomas Widjaja, Peter Buxmann, Jin Gerlach:
Der "Preis des Kostenlosen". Wirtschaftsinformatik Manag. 4(6): 12-19 (2012) - [c12]Anton Pussep, Markus Schief, Thomas Widjaja:
The Software Value Chain: Methods for Construction and their Application. ECIS 2012: 116 - [c11]Jasmin Kaiser, Thomas Widjaja, Peter Buxmann:
Analyzing Client Dependence in Dyadic IS Outsourcing Relationships. Global Sourcing Workshop 2012: 1-19 - [c10]Tobias Ackermann, Thomas Widjaja, Alexander Benlian, Peter Buxmann:
Perceived IT Security Risks of Cloud Computing: Conceptualization and Scale Development. ICIS 2012 - [c9]Jasmin Kaiser, Thomas Widjaja, Peter Buxmann:
Positioning Clients in Dyadic Dependence Structures of IS Outsourcing Relationships - Conceptualization and Empirical Findings. ICIS 2012 - [c8]Thomas Widjaja, Robert Wayne Gregory:
Design Principles for Heterogeneity Decisions in Enterprise Architecture Management. ICIS 2012 - [c7]Thomas Widjaja, Jasmin Kaiser, Dennis Tepel, Peter Buxmann:
Heterogeneity in IT Landscapes and Monopoly Power of Firms: A Model to Quantify Heterogeneity. ICIS 2012 - [c6]Tobias Draisbach, Thomas Widjaja, Peter Buxmann:
Lock-Ins auf Netzeffektmärkten - Ergebnisse einer Simulationsstudie. MKWI 2012: 691-704 - 2011
- [b1]Thomas Widjaja:
Standardisierungsentscheidungen in mehrschichtigen Systemen: Untersuchung am Beispiel serviceorientierter Architekturen. Darmstadt University of Technology, 2011, ISBN 978-3-8349-2715-6, pp. 1-243 - [j2]Alexander Becker, Thomas Widjaja, Peter Buxmann:
Value Potentials and Challenges of Service-Oriented Architectures - Results of an Empirical Survey from User and Vendor Perspective. Bus. Inf. Syst. Eng. 3(4): 199-210 (2011) - [j1]Alexander Becker, Thomas Widjaja, Peter Buxmann:
Nutzenpotenziale und Herausforderungen des Einsatzes von Serviceorientierten Architekturen - Ergebnisse einer empirischen Untersuchung aus Anwender- und Herstellersicht. Wirtschaftsinf. 53(4): 187-199 (2011) - [c5]Anton Pussep, Markus Schief, Thomas Widjaja, Peter Buxmann, Christian M. Wolf:
The Software Value Chain as an Analytical Framework for the Software Industry and Its Exemplary Application for Vertical Integration Measurement. AMCIS 2011 - [c4]Christoph Burkard, Tobias Draisbach, Thomas Widjaja, Peter Buxmann:
Software ecosystems: vendor-sided characteristics of online marketplaces. GI-Jahrestagung 2011: 421
2000 – 2009
- 2009
- [c3]Alexander Becker, Peter Buxmann, Thomas Widjaja:
Value potential and challenges of service-oriented architectures - A user and vendor perspective. ECIS 2009: 2085-2096 - [c2]Thomas Widjaja, Peter Buxmann:
Service-oriented architectures: Modeling the selection of services and platforms. ECIS 2009: 2420-2431 - 2008
- [c1]Jan Christian Lang, Thomas Widjaja, Peter Buxmann, Wolfgang Domschke, Thomas Hess:
Optimizing the Supplier Selection and Service Portfolio of a SOA Service Integrator. HICSS 2008: 89
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 21:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint