Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers' coping strategies., , and . Int. J. Inf. Manag., (2021)Open and Responsible Innovation Concepts for Competitive Advantage., , and . MCIS, page 19. AISeL, (2015)Coping Strategies and Paradoxes Related to BYOD Information Security Threats in France., and . J. Glob. Inf. Manag., 28 (2): 1-28 (2020)Exploring the Suitability of IS Security Management Standards for SMEs., and . HICSS, page 308. IEEE Computer Society, (2008)Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users., , and . Int. J. Inf. Manag., (2018)Opinion Paper: "So what if ChatGPT wrote it?" Multidisciplinary perspectives on opportunities, challenges and implications of generative conversational AI for research, practice and policy., , , , , , , , , and 63 other author(s). Int. J. Inf. Manag., (August 2023)Climate change and COP26: Are digital technologies and information management part of the problem or the solution? An editorial reflection and call to action., , , , , , , , , and 27 other author(s). Int. J. Inf. Manag., (2022)