Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing Information Risks and Protecting Information Assets in a Web 2.0 Era., and . Bled eConference, page 25. (2010)Information Security Governance: Investigating Diversity in Critical Infrastructure Organizations., , and . Bled eConference, page 13. (2012)Internal auditors, managers and the framing of continuous monitoring: A case study of an Australian Wholesale company.. AMCIS, Association for Information Systems, (2012)E-Procurement: Current Issues & Future Challenges., and . ECIS, page 131-142. University of St. Gallen, (2007)Analytical framework for social media risk analysis in organizations., , and . CENTERIS/ProjMAN/HCist, volume 181 of Procedia Computer Science, page 302-309. Elsevier, (2020)Thinking about identities of Information Professionals: Exploring the Concept of intersectionality., and . ECIS, page 163. (2012)The Messy Matters of Continuous Assurance: Findings from Exploratory Research in Australia.. J. Information Systems, 28 (2): 357-377 (2014)Enterprise 2.0 Research: Meeting the Challenges of Practice., , , and . Bled eConference, page 33. (2013)Public eProcurement in Action: Policies, Practices and Technologies., and . TCGOV, volume 3416 of Lecture Notes in Computer Science, page 286-297. Springer, (2005)E-government policy and practice: A theoretical and empirical exploration of public e-procurement., and . Gov. Inf. Q., 25 (2): 155-180 (2008)