Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing GDSS technology: Final report on a recent empirical study., and . Inf. Manag., 18 (5): 213-220 (1990)Security concerns of system users: A study of perceptions of the adequacy of security., and . Inf. Manag., 20 (1): 13-27 (1991)When Subordinates Become IT Contractors: Persistent Managerial Expectations in IT Outsourcing., , and . Inf. Syst. Res., 14 (1): 66-86 (2003)The Effect of Culture on IT Diffusion: E-Mail and FAX in Japan and the U.S.. Inf. Syst. Res., 5 (1): 23-47 (1994)Conflating Antecedents and Formative Indicators: A Comment on Aguirre-Urreta and Marakas., , , , , , , and . Inf. Syst. Res., 25 (4): 780-784 (2014)Innovation and Policy Support for Two-Sided Market Platforms: Can Government Policy Makers and Executives Optimize Both Societal Value and Profits?, , , and . Inf. Syst. Res., 30 (3): 1037-1050 (2019)Validating Instruments in MIS Research.. MIS Q., 13 (2): 147-169 (1989)Discovering and Disciplining Computer Abuse in Organizations: A Field Study., and . MIS Q., 14 (1): 45-60 (1990)Production and Transaction Economies and IS Outsourcing: A Study of the U.S. Banking Industry., and . MIS Q., 22 (4): 535-552 (1998)Transfer of Information Technology to the Arab World: A Test of Cultural Influence Modeling., , and . J. Glob. Inf. Manag., 9 (4): 6-28 (2001)