Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Critical tactics for implementing Porter's generic strategies, , , and . J. of Business Strategy, 27 (1): 43--53 (2006)Factors Influencing Information System Flexibility: An Interpretive Flexibility Perspective., , , and . IJEIS, 5 (1): 32-43 (2009)Aligning information technology and business strategy with a dynamic capabilities perspective: A longitudinal study of a Taiwanese Semiconductor Company., , , and . Int. J. Inf. Manag., 28 (5): 366-378 (2008)An Evaluation of Introductory MIS Textbooks based on Readability Measures., , and . J. Inf. Syst. Educ., 9 (1-2): 29-34 (1998)Small and mid-sized businesses and Internet use: unrealized potential?, , and . Internet Res., 8 (3): 229-235 (1998)Information Technology (IT) and the Healthcare Industry: A SWOT Analysis., , and . Int. J. Heal. Inf. Syst. Informatics, 3 (1): 75-92 (2008)Linking strategic practices and organizational performance to Porter's generic strategies., and . Business Proc. Manag. Journal, 12 (4): 433-454 (2006)Shielding your company against information compromise., , and . Inf. Manag. Comput. Secur., 8 (3): 117-130 (2000)Technologies in support of mass customization strategy: Exploring the linkages between e-commerce and knowledge management., , , and . Comput. Ind., 59 (4): 351-363 (2008)Viewpoint: The Risk of Information Compromise and Approaches to Prevention., , and . J. Strateg. Inf. Syst., 9 (1): 5-15 (2000)