Author of the publication

Using Stakeholder Analysis to Identify Users in Healthcare Information Systems Research: Who is the Real User?

, and . IJHISI, 4 (3): 1-15 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multilevel Investigation of Participation Within Virtual Health Communities., , , and . Commun. Assoc. Inf. Syst., (2014)Why there aren't more information security research studies., and . Inf. Manag., 41 (5): 597-607 (2004)Identifying Exceptional Application Software Developers: A Comparison of Students and Professionals., , and . Commun. Assoc. Inf. Syst., (2003)A method to measure the accounting abnormal returns of largescale information technology investments: the case of enterprise systems., and . AMCIS, page 389. Association for Information Systems, (2010)Network evolution towards ISDN services: a management perspective., and . JIT, 13 (1): 67-78 (1998)Knowledge sharing in open source software project teams: A transactive memory system perspective., , , and . Int. J. Inf. Manag., 33 (3): 553-563 (2013)Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm., , , and . AMCIS, Association for Information Systems, (2011)Identifying the User in Healthcare Information Systems Resear., and . HICSS, page 141. IEEE Computer Society, (2007)Carnegie Classifications and Institution Productivity in Information Systems Research: A Scientometric Study., , and . Commun. Assoc. Inf. Syst., (2007)Security Risk Management in Healthcare: A Case Study., , and . Commun. Assoc. Inf. Syst., (2014)