Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Value of IT: Explaining the Strategic Role of Information Systems for Fast Growing SMES., , and . MCIS, page 37. AISeL, (2015)Trust and Control in Complex Information Systems Development., , , and . SIGSAND, volume 232 of Lecture Notes in Business Information Processing, page 32-44. Springer, (2015)A Process for Selection and Training of Super-users for ERP Implementation Projects., , , , and . ISD, Association for Information Systems, (2017)Enriching feedback in audience response systems: Analysis and implications of objective and subjective metrics on students' performance and attitudes., , , and . J. Comput. Assist. Learn., 35 (2): 305-316 (2019)A Multidimensional Model of Trust in Recommender Systems., , , and . EC-Web, volume 123 of Lecture Notes in Business Information Processing, page 212-219. Springer, (2012)Evaluation of Techniques for Structuring Multi-Criteria Decision Problems., , and . CONF-IRM, page 20. (2012)Student Groups as Tutors in Information Systems Education - Students Perspectives on Collaboration and Outcomes., , and . CSEDU (2), page 37-45. SciTePress, (2017)Barriers to Open-Source Software Adoption: Review and Synthesis., and . ISD, Lund University / Association for Information Systems, (2018)A double-edged Sword Named Agility: a Critical Perspective on Organizational responses to Environmental Disruption., , , and . ECIS, (2020)Chances and Limits of End-User Development: A Conceptual Model., , , and . SCIS, volume 223 of Lecture Notes in Business Information Processing, page 208-219. Springer, (2015)