Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Critical Realm-Based Explanatory Case Study Research in Information Systems., and . ICIS, page 202. Association for Information Systems, (2008)Critical Realism and Mechanisms: Moving from the Philosophical to the Empirical in the Search for Causal Explanations., , , and . AMCIS, Association for Information Systems, (2013)A critical realist script for creative theorising in information systems., and . Eur. J. Inf. Syst., 27 (3): 315-325 (2018)Preventive Adoption of Information Security Behaviors., , , and . ICIS, Association for Information Systems, (2013)Recent Advances and Opportunities for Improving Critical Realism-Based Case Study Research in IS., and . J. AIS, 21 (1): 8 (2020)A Theoretical Framework for Consumer E-Satisfaction and Site Stickiness: An Evaluation in the Context of Online Hotel Reservations., , , and . J. Organ. Comput. Electron. Commer., 22 (1): 1-37 (2012)e-Voting intent: A comparison of young and elderly voters., , , , and . Gov. Inf. Q., 29 (3): 361-372 (2012)Explaining Users' Security Behaviors with the Security Belief Model., , , , and . JOEUC, 26 (3): 23-46 (2014)The role of informal control in PMO lite environments., , and . CPR, page 27-30. ACM, (2012)Causal Explanation in the Coordinating Process: A Critical Realist Case Study of Federated IT Governance Structures., and . MIS Q., 37 (3): 933-964 (2013)