Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conflicts, Compromises, and Political Decisions: Methodological Challenges of Enterprise-Wide E-Business Architecture Creation., and . IJEIS, 5 (2): 49-70 (2009)Research areas and challenges for mobile information systems., , , , , and . Int. J. Mob. Commun., 2 (3): 220-234 (2004)From platform dominance to weakened ownership: how external regulation changed Finnish e-identification., , and . Electron. Mark., 30 (3): 525-538 (2020)Explaining an E-identification Framework Implementation using Dialectics., , and . ECIS, (2019)Towards a Framework for Building Theory from ISD Practices., , and . ISD, page 611-622. Springer, (2010)Desired Quality Characteristics in Cloud Application Development., , and . ICSOFT, page 303-312. SciTePress, (2013)Investigating the relationship between schedules and knowledge transfer in software testing., , and . Inf. Softw. Technol., 51 (3): 663-677 (2009)Organizational and customer related challenges of software testing: An empirical study in 11 software companies., , and . RCIS, page 1-12. IEEE, (2014)Finding and Ranking Research Directions for Software Testing., , and . EuroSPI, volume 3792 of Lecture Notes in Computer Science, page 39-48. Springer, (2005)How Applicable Is ISO/IEC 29110 in Game Software Development?, , and . PROFES, volume 7983 of Lecture Notes in Computer Science, page 5-19. Springer, (2013)