Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explaining Users' Security Behaviors with the Security Belief Model., , , , and . JOEUC, 26 (3): 23-46 (2014)Governance, Leadership, And Management In Adaptive And Inventive Digital Communities: A Research Agenda To Reduce Waste In Graduate Education., , , , and . Bled eConference, page 19. (2004)Resilience of Professional Open Source Ecosystems., , and . ECIS, page 1454-1465. (2008)A Strategic View of IT and Innovativeness., and . SIGMIS-CPR, page 67-76. ACM, (2019)Research Agenda for Studying Open Source II: View Through the Lens of Referent Discipline Theories., , , , and . Commun. Assoc. Inf. Syst., (2006)Criteria and Recommendations for IS Research that Bridges the Academic-Practitioner Gap., and . HICSS, page 1-8. ScholarSpace, (2019)Enterprise architecture, IT effectiveness and the mediating role of IT alignment in US hospitals., , , , and . Inf. Syst. J., 22 (2): 97-127 (2012)Principles for Conducting Critical Realist Case Study Research in Information Systems., and . MIS Q., 36 (3): 787-810 (2012)Searching for Herbert Simon: Extending the Reach and Impact of Business Intelligence Research Through Analytics., , and . Int. J. Bus. Intell. Res., 4 (1): 1-12 (2013)Why students choose MIS: what makes a major-job-career in management information systems interesting?, , , and . CPR, page 57-62. ACM, (2009)