Author of the publication

From Hindsight to Foresight: Applying Futures Research Techniques in Information Systems.

, and . Commun. Assoc. Inf. Syst., (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strategic value and drivers behind organizational adoption of enterprise DRM: The korean case., and . J. Serv. Sci. Res., 4 (1): 143-168 (2012)Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation., and . Inf. Syst. Frontiers, 22 (1): 221-242 (2020)Methods for Studying the Information Systems Future., and . Researching the Future in Information Systems, volume 356 of IFIP Advances in Information and Communication Technology, page 299-316. Springer, (2011)Using Scenarios to Understand the Frontiers of IS., and . Inf. Syst. Frontiers, 1 (1): 15-24 (1999)Redesigning the questioning, discussion, and document processes., and . SIGCPR, page 326-337. ACM, (1996)Development of methods for identifying an appropriate benchmarking peer to establish information security policy., , , , and . Expert Syst. Appl., (2022)The effects of cyber regulations and security policies on organizational outcomes: a knowledge management perspective., , and . Eur. J. Inf. Syst., 32 (2): 154-172 (March 2023)Managing academic electronic publishing: Six case studies., and . ECIS, page 751-762. (2001)A model of Internet standards adoption: the case of IPv6., , and . Inf. Syst. J., 14 (3): 265-294 (2004)Confucian Values, Social Fear, and Knowledge Sharing in Korean Organizations., , and . J. Comput. Inf. Syst., 62 (2): 237-246 (2022)