Author of the publication

Evaluating Journal Quality and the Association for Information Systems Senior Scholars' Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value?

, , , , , , and . MIS Q., 37 (4): 993-1012 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the Usability Evaluation Technique, Heuristic Evaluation, through the Use of Collaborative Software., and . AMCIS, page 284. Association for Information Systems, (2003)Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms., , , and . PACIS, page 140. (2015)Visual storytelling for improving the comprehension and utility in disseminating information systems research: Evidence from a quasi-experiment., , , and . Inf. Syst. J., 29 (6): 1153-1177 (2019)Developing and Measuring IS Scales Using Item Response Theory., , , and . ICIS, Association for Information Systems, (2013)Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It., and . IEEE Trans. Prof. Communication, 57 (2): 123-146 (2014)How do bidders' organism reactions mediate auction stimuli and bidder loyalty in online auctions? The case of Taobao in China., , and . Inf. Manag., 53 (5): 609-624 (2016)Examining the intended and unintended consequences of organisational privacy safeguards., , , and . Eur. J. Inf. Syst., 26 (1): 37-65 (2017)Model checking for E-business control and assurance., , , and . IEEE Trans. Syst. Man Cybern. Part C, 35 (3): 445-450 (2005)Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies., and . Inf. Syst. J., 25 (5): 433-463 (2015)Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study., and . Inf. Syst. J., 29 (1): 43-69 (2019)