Author of the publication

A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research.

, , , , and . Inf. Syst. Res., 25 (1): 111-136 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Value-Focused Assessment of Information System Security in Organizations., and . ICIS, page 561-566. Association for Information Systems, (2001)What Interrupts Intention to Comply with IS-Security Policy?, and . AMCIS, Association for Information Systems, (2016)Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model., , and . AMCIS, Association for Information Systems, (2016)A Semantic Analysis of Security Policy Formulation and Implementation: A Case Study., and . AMCIS, page 166. Association for Information Systems, (2006)Using Actor Network Theory to Understand Information Security Management., , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 43-54. Springer, (2010)Are we really competent?: Assessing organizational ability in delivering IT benefits., and . Business Proc. Manag. Journal, 16 (1): 5-28 (2010)When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems., , , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 352-363. Springer, (2012)Interpreting Dimensions of Consumer Trust in E-Commerce., and . Inf. Technol. Manag., 4 (2-3): 303-318 (2003)Disassociations in Security Policy Lifecycles., and . Int. J. Inf. Secur. Priv., 9 (1): 62-77 (2015)Panel: Information systems security standards: The solution or the problem?, , , and . ECIS, page 1780-1782. (2005)