Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Security Policy Compliance: The Role of Information Security Awareness., , and . AMCIS, Association for Information Systems, (2012)Detecting fake news for reducing misinformation risks using analytics approaches., , , , and . Eur. J. Oper. Res., 279 (3): 1036-1052 (2019)Dynamic collaboration: participant-driven agile processes for complex tasks., , , and . DATA BASE, 42 (2): 95-115 (2011)Impact of Using Online Health Management Tools on Patient Perception of Healthcare Quality: A Multiple Chronic Conditions and Generational Perspective., , and . Commun. Assoc. Inf. Syst., (2022)Big Data & Analytics for Societal Impact: Recent Research and Trends., , , , and . Inf. Syst. Frontiers, 20 (2): 185-194 (2018)The Role of Vulnerability Disclosure on Hacker Participation in Bug Bounty Programs., , and . ICIS, Association for Information Systems, (2021)An Approach for Intent Identification by Building on Deception Detection., , , , , , , , , and 2 other author(s). HICSS, IEEE Computer Society, (2005)Towards a Design Theory for Process-Based Knowledge Management Systems., and . ICIS, page 63. Association for Information Systems, (2009)Enhancing E-learning using Artifact-Based Collaboration., , , and . AMCIS, page 774. Association for Information Systems, (2009)Leveraging Data Analytics for Behavioral Research., , , and . Inf. Syst. Frontiers, 21 (4): 735-742 (2019)