Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Negotiating a Systems Development Method., and . ISD, page 491-499. Springer, (2008)Exploring the Role of Method Rationale in the Context of Teaching Information Systems Development Methods., , and . ISD, page 801-809. Springer, (2008)Exploring the Explanatory Power of Actability., , and . Organizational Semiotics, volume 227 of IFIP Conference Proceedings, page 1-20. Kluwer, (2001)Flexibile Processes and Method Configuration: Outline of a Joint Industry-Academia Research Project., , , , , and . ICEIS (3), page 519-522. (2003)Using Actor Network Theory to Understand Information Security Management., , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 43-54. Springer, (2010)A Conceptual Framework for Time Distortion Analysis in Method Components., , and . BMMDS/EMMSAD, volume 175 of Lecture Notes in Business Information Processing, page 454-463. Springer, (2014)Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale., , and . Inf. Manag. Comput. Secur., 21 (4): 266-287 (2013)Uncovering Situations of Cargo Cult Behavior in Agile Software Development Method Use., , and . HICSS, page 6486-6495. ScholarSpace, (2023)Using two heads in practice.. WEUSE@ICSE, page 43-47. ACM, (2008)Practice-Based Discourse Analysis of InfoSec Policies., , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 297-310. Springer, (2015)