Author of the publication

IS 2009: Changing the Course for Undergraduate IS Model Curricula.

, , , , , , , and . ICIS, page 149. Association for Information Systems, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending Ecommerce Deception Theory to Phishing., , and . ICIS, Association for Information Systems, (2014)Revisiting the Impact of System Use on Task Performance: An Exploitative-Explorative System Use Framework., , and . J. AIS, 20 (4): 3 (2019)Research Note - Using Expectation Disconfirmation Theory and Polynomial Modeling to Understand Trust in Technology., , , and . Inf. Syst. Res., 27 (1): 197-213 (2016)Understanding online customers' ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty., , , and . Eur. J. Inf. Syst., 23 (2): 185-204 (2014)AMCIS 2021 Awards and Closing Ceremony., , , , , , , , , and . AMCIS, Association for Information Systems, (2021)Social Media and Emergency Management: Exploring State and Local Tweets., , and . HICSS, page 1968-1977. IEEE Computer Society, (2014)Old Wine in New Bottles: Investigating how Information Technology is Enabling Öld Criminals" to access "New Venues"., , and . AMCIS, page 418. Association for Information Systems, (2010)Privacy, Accuracy, and Accessibility of Digital Business., and . Computing Handbook, 3rd ed. (2), CRC Press, (2014)Combating Phishing Attacks: A Knowledge Management Approach., , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Assessing Common Method Bias: Problems with the ULMC Technique., , and . MIS Q., 36 (3): 1003-1019 (2012)