Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enterprise Systems Implementation Success in the Shakedown Phase., , and . AMCIS, Association for Information Systems, (2013)Understanding Knowledge Coordination Dynamics in Traditional and Fast-Response IT Organizations., , and . ICIS, Association for Information Systems, (2014)Business IT Alignment through the Lens of Complexity Science., , and . ICIS, Association for Information Systems, (2016)Shifting Complexity: The Impact of Modularization on IS Complexity., , , , and . ECIS, (2022)Governing security in a digital world is not a " one size fits all" solution: A multiple case study about security governance modes and their effectiveness., , , and . HICSS, page 6533-6542. ScholarSpace, (2024)Digital Security Governance: What Can We Learn from High Reliability Organizations (HROs)?, , , and . HICSS, page 5938-5948. ScholarSpace, (2023)Knowledge Integration in Global R&D Networks., , , and . Global Sourcing Workshop, volume 55 of Lecture Notes in Business Information Processing, page 82-102. Springer, (2010)Real Decisions in Virtual Worlds: Team Collaboration and Decision Making in 3D Virtual Worlds., , and . ICIS, page 18. Association for Information Systems, (2010)Bridging Knowledge Boundaries in Cross-Functional Groups: The Role of a Transactive Memory System., , and . ICIS, page 1. Association for Information Systems, (2009)Understanding virtual world usage: A multipurpose model and empirical testing., , , and . ECIS, page 761-775. (2009)