Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Business Rules Approach and Its Effect on Software Testing., , , and . IEEE Software, 29 (4): 60-66 (2012)Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues., , , , and . ACM Trans. Manag. Inf. Syst., 4 (2): 9:1-9:21 (2013)Using Wearable Devices for Non-invasive, Inexpensive Physiological Data Collection., , , , and . HICSS, page 1-9. ScholarSpace / AIS Electronic Library (AISeL), (2017)Production vs. Consumption on Social Media: A Uses and Gratifications Perspective., , , and . AMCIS, Association for Information Systems, (2019)Dynamic collaboration: participant-driven agile processes for complex tasks., , , and . DATA BASE, 42 (2): 95-115 (2011)Pulling the Plug: When to Call It a Day on Research Projects., and . Commun. Assoc. Inf. Syst., (2011)An Approach for Intent Identification by Building on Deception Detection., , , , , , , , , and 2 other author(s). HICSS, IEEE Computer Society, (2005)MIS-aligned Student Perspectives of Outsourcing and Offshoring., , , and . AMCIS, Association for Information Systems, (2011)An fMRI Exploration of Information Processing in Electronic Networks of Practice., , , and . MIS Q., (2019)Cognitive Patterns of Information Addiction., , and . AMCIS, Association for Information Systems, (2017)