Author of the publication

"Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels.

, , , and . J. Strateg. Inf. Syst., 25 (3): 232-240 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the Usability Evaluation Technique, Heuristic Evaluation, through the Use of Collaborative Software., and . AMCIS, page 284. Association for Information Systems, (2003)Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms., , , and . PACIS, page 140. (2015)Model checking for E-business control and assurance., , , and . IEEE Trans. Syst. Man Cybern. Part C, 35 (3): 445-450 (2005)Developing and Measuring IS Scales Using Item Response Theory., , , and . ICIS, Association for Information Systems, (2013)Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It., and . IEEE Trans. Prof. Communication, 57 (2): 123-146 (2014)Visual storytelling for improving the comprehension and utility in disseminating information systems research: Evidence from a quasi-experiment., , , and . Inf. Syst. J., 29 (6): 1153-1177 (2019)How do bidders' organism reactions mediate auction stimuli and bidder loyalty in online auctions? The case of Taobao in China., , and . Inf. Manag., 53 (5): 609-624 (2016)Examining the intended and unintended consequences of organisational privacy safeguards., , , and . Eur. J. Inf. Syst., 26 (1): 37-65 (2017)Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies., and . Inf. Syst. J., 25 (5): 433-463 (2015)Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study., and . Inf. Syst. J., 29 (1): 43-69 (2019)