Author of the publication

Why do we Need this? Roles in the Information System Acquisition legitimation Process.

, , and . ECIS, page Research Paper 166. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Magical "We": Enhancing Collaboration Transparency in Grounded Theory Method in Information Systems Research., , , and . Commun. Assoc. Inf. Syst., (2019)Why do we Need this? Roles in the Information System Acquisition legitimation Process., , and . ECIS, page Research Paper 166. (2016)Grounding Theory from Delphi Studies., , and . ICIS, Association for Information Systems, (2011)ERP based business learning environment as a boundary infrastructure in business learning., and . Educ. Inf. Technol., 24 (4): 2547-2566 (2019)Foreword., , , and . SCIS, page 14. Association for Information Systems, (2019)Collaborative virtual environments in the year of the dragon., , , , , and . CVE, page 11-18. ACM, (2000)Understanding Enterprise Architecture: Perceptions by the Finnish Public Sector., and . EGOV, volume 7443 of Lecture Notes in Computer Science, page 162-173. Springer, (2012)A Process Model for Public Sector It Management to Answer the Needs of Digital Transformation., and . HICSS, page 1-10. ScholarSpace, (2019)Riding for a Fall in Outsourced ISD: Knowledge Transfer Challenges Between the Onshore Vendor and the Offshored Unit., and . Global Sourcing Workshop, volume 236 of Lecture Notes in Business Information Processing, page 124-141. Springer, (2015)"What We Cannot Speak about We Must Pass over in Silence" - (In)correctly Arguing and Comparing the Costs of IT Investments in Public Sector., and . EGOVIS, volume 6267 of Lecture Notes in Computer Science, page 22-31. Springer, (2010)