Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Antecedents to Risk and Threat in HCI: Controlling for the unknown., , and . PACIS, page 127. (2016)From the Ground to Core Assumptions: a Reflective Examination of Perspective versus Structure in is Theorizing and Writing.. ECIS, (2014)Technoidentology: Towards An Explication Of Individual Relationships With IS/IT., , and . ECIS, page 81. (2013)Explicating Individual Relationships with IS/IT and Uncovering Techno-identities Using Repertory Grid and Laddering to Core Constructs.. ICIS, Association for Information Systems, (2014)The Alexandria Digital Library Testbed., , , , , , and . D Lib Mag., (1996)Towards an Understanding of Valence in E-Government Services., , , , and . CoRR, (2016)Best Practices or Improvisation in System Change? An Exploratory ST., , , , and . PACIS, page 223. (2016)Being Between Worlds: Individual-Societal Openness, Expansion, and Becoming through Meaningful Technologies.. ECIS, (2015)Best Practices or Improvisation in System Change? An Exploratory ST., , , , and . PACIS, page 223. (2016)Avian-inspired passive perching mechanism for robotic rotorcraft., , , , , , , , and . IROS, page 4975-4980. IEEE, (2011)