Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations., , and . IEEE Access, (2022)How Different Types of IS Assets Account for Synergy-Enabled Value in Multi-Unit Firms: Mapping of Critical Success Factors and Key Performance Indicators., , and . AMCIS, Association for Information Systems, (2016)One Size Fits All? The contingent Role of Centrality in IT Network Governance., , , and . PACIS, page 384. (2014)Value Co-creation through Network IT Alignment: An Empirical Examination in Regional Networks., , , , and . AMCIS, Association for Information Systems, (2015)Dimensions of Trust in the Acceptance of Inter-Organizational Information Systems in Networks: towards a Socio-Technical Perspective., , and . PACIS, page 41. (2014)The Contingent Role of Centrality in IT Network Governance: An Empirical Examination., , and . Pac. Asia J. Assoc. Inf. Syst., 7 (1): 3 (2015)Influence of Network Characteristics on Inter-Organizational IT Integration: The Role of Commitment and Trust., , , and . AMCIS, Association for Information Systems, (2015)E-Business Adoption at the Firm Level: Comparing the Predictive Power of Competing IS Adoption Models., , and . ICIS, Association for Information Systems, (2014)Extending the model of internet standards adoption: A cross-country comparison of IPv6 adoption., and . Inf. Manag., 55 (4): 450-460 (2018)Supplier Relationship Management in Information Systems Research: A Literature Review., and . MKWI, page 479-490. Universitätsverlag Ilmenau, (2016)