To invest or not to invest? Assessing the economic viability of a policy and security configuration management tool L Demetz, D Bachlechner The economics of information security and privacy, 25-47, 2013 | 45 | 2013 |
Impact of mobile cross-platform development on CPU, memory and battery of mobile devices when using common mobile app features T Dorfer, L Demetz, S Huber Procedia Computer Science 175, 189-196, 2020 | 38 | 2020 |
Challenges in cross-organizational security management S Thalmann, D Bachlechner, L Demetz, R Maier 2012 45th Hawaii International Conference on System Sciences, 5480-5489, 2012 | 30 | 2012 |
Integrating threat intelligence to enhance an organization's information security management M Gschwandtner, L Demetz, M Gander, R Maier Proceedings of the 13th International Conference on Availability …, 2018 | 21 | 2018 |
A comparative study on the energy consumption of Progressive Web Apps S Huber, L Demetz, M Felderer Information Systems 108, 102017, 2022 | 19 | 2022 |
Pwa vs the others: A comparative study on the ui energy-efficiency of progressive web apps S Huber, L Demetz, M Felderer International Conference on Web Engineering, 464-479, 2021 | 18 | 2021 |
Complexity is dead, long live complexity! How software can help service providers manage security and compliance S Thalmann, D Bachlechner, L Demetz, M Manhart Computers & security 45, 172-185, 2014 | 15 | 2014 |
Performance Analysis of Mobile Cross-platform Development Approaches based on Typical UI Interactions. S Huber, L Demetz ICSOFT, 40-48, 2019 | 12 | 2019 |
Analysing the performance of mobile cross-platform development approaches using UI interaction scenarios S Huber, L Demetz, M Felderer Software Technologies: 14th International Conference, ICSOFT 2019, Prague …, 2020 | 11 | 2020 |
Towards data-driven decision support for organizational IT security audits M Brunner, C Sillaber, L Demetz, M Manhart, R Breu it-Information Technology 60 (4), 207-217, 2018 | 9 | 2018 |
All you need is trust–an analysis of trust measures communicated by cloud providers J Gantner, L Demetz, R Maier On the Move to Meaningful Internet Systems: OTM 2015 Conferences …, 2015 | 9 | 2015 |
Performance measurement in cross-organizational security settings L Demetz, S Thalmann, D Bachlechner, R Maier 2011 Third International Workshop on Security Measurements and Metrics, 84-87, 2011 | 6 | 2011 |
IT-supported formal control: how perceptual (in) congruence affects the convergence of crowd-sourced ideas I Seeber, L Waizenegger, L Demetz, AB Merz, GJ de Vreede, R Maier, ... | 5 | 2016 |
Understanding the management of information security controls in practice D Bachlechner, R Maier, F Innerhofer-Oberperfler, L Demetz secau Security Research Centre, Edith Cowan University, Perth, Western Australia, 2011 | 5 | 2011 |
Key roles in cross-organisational security settings S Thalmann, D Bachlechner, R Maier, M Manhart, L Demetz Proceedings of the 2nd European Security Conference, 2011 | 5 | 2011 |
Analyzing the impact of new features on users’ communication activities in online social networks L Demetz, B Heinrich, M Klier Proceedings of the 19th European Conference on Information Systems (ECIS …, 2011 | 4 | 2011 |
Comparing the Energy Consumption of WebAssembly and JavaScript in Mobile Browsers. D Pockstaller, S Huber, L Demetz WEBIST, 121-127, 2023 | 1 | 2023 |
BRIDGING THE GAP BETWEEN SECURITY MANAGEMENT AND BUSINESS STRATEGY: A BALANCED SCORECARD APPROACH L Demetz, S Thalmann, D Bachlechner | | |