Author of the publication

In Search of the Primary Suppliers of IS Research: Who Are They and Where Did They Come From?

, and . Commun. Assoc. Inf. Syst., (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multilevel Investigation of Participation Within Virtual Health Communities., , , and . Commun. Assoc. Inf. Syst., (2014)Network evolution towards ISDN services: a management perspective., and . JIT, 13 (1): 67-78 (1998)Why there aren't more information security research studies., and . Inf. Manag., 41 (5): 597-607 (2004)A method to measure the accounting abnormal returns of largescale information technology investments: the case of enterprise systems., and . AMCIS, page 389. Association for Information Systems, (2010)Knowledge sharing in open source software project teams: A transactive memory system perspective., , , and . Int. J. Inf. Manag., 33 (3): 553-563 (2013)Identifying Exceptional Application Software Developers: A Comparison of Students and Professionals., , and . Commun. Assoc. Inf. Syst., (2003)Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm., , , and . AMCIS, Association for Information Systems, (2011)Identifying the User in Healthcare Information Systems Resear., and . HICSS, page 141. IEEE Computer Society, (2007)Matrix Passwords: A Proposed Methodology of Password Authentication., and . AMCIS, Association for Information Systems, (2012)Digital Forensics Curriculum Development: Identification of Knowledge Domains Learning Objectives and Core Concepts., and . AMCIS, page 421. Association for Information Systems, (2006)