Multidimensional access methods V Gaede, O Günther ACM Computing Surveys (CSUR) 30 (2), 170-231, 1998 | 2725 | 1998 |
Privacy in e-commerce: Stated preferences vs. actual behavior B Berendt, O Günther, S Spiekermann Communications of the ACM 48 (4), 101-106, 2005 | 647 | 2005 |
Self-disclosure and privacy calculus on social networking sites: The role of culture: Intercultural dynamics of privacy calculus H Krasnova, NF Veltri, O Günther Wirtschaftsinformatik 54, 123-133, 2012 | 481 | 2012 |
Privacy concerns and identity in online social networks H Krasnova, O Günther, S Spiekermann, K Koroleva Identity in the Information Society 2, 39-63, 2009 | 351 | 2009 |
Environmental information systems O Günther Acm Sigmod Record 26 (1), 3-4, 1997 | 288 | 1997 |
RFID and the perception of control: the consumer's view O Günther, S Spiekermann Communications of the ACM 48 (9), 73-76, 2005 | 256 | 2005 |
" It won't happen to me!": self-disclosure in online social networks H Krasnova, E Kolesnikova, O Guenther AIS/ICIS, 2009 | 223 | 2009 |
Efficient structures for geometric data management O Günther Springer Berlin Heidelberg, 1988 | 222 | 1988 |
Research issues in spatial databases O Günther, A Buchmann ACM Sigmod Record 19 (4), 61-68, 1990 | 187 | 1990 |
Modeling microblogging adoption in the enterprise O Günther, H Krasnova, D Riehle, V Schöndienst | 166 | 2009 |
RFID in Manufacturing O Günther, W Kletti, U Kubach Springer, 2008 | 139* | 2008 |
It’s all about networking! Empirical investigation of social capital formation on social network sites K Koroleva, H Krasnova, NF Veltri, O Günther | 137 | 2011 |
Investigating the value of privacy on online social networks: conjoint analysis H Krasnova, T Hildebrand, O Guenther | 131 | 2009 |
Learning from quality issues of BPMN models from industry H Leopold, J Mendling, O Günther IEEE software 33 (4), 26-33, 2015 | 119 | 2015 |
Security analysis of the object name service B Fabian, O Günther, S Spiekermann Humboldt-Universität zu Berlin, 2005 | 116 | 2005 |
‘stop spamming me!’-exploring information overload on facebook K Koroleva, H Krasnova, O Günther | 112 | 2010 |
Event-based monitoring of process execution violations M Weidlich, H Ziekow, J Mendling, O Günther, M Weske, N Desai Business Process Management: 9th International Conference, BPM 2011 …, 2011 | 103 | 2011 |
Security challenges of the EPCglobal network B Fabian, O Günther Communications of the ACM 52 (7), 121-125, 2009 | 101 | 2009 |
Why participate in an online social network? An empirical analysis H Krasnova, T Hildebrand, O Guenther, A Kovrigin, A Nowobilska | 99 | 2008 |
RFID and the internet of things: Technology, applications, and security challenges S Evdokimov, B Fabian, O Günther, L Ivantysynova, H Ziekow Foundations and Trends® in Technology, Information and Operations Management …, 2011 | 71 | 2011 |