Author of the publication

Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions.

, , and . Data Base, 53 (1): 25-60 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward a refined conceptualization of IS discontinuance: Reflection on the past and a way forward., and . Inf. Manag., 57 (2): 103167 (2020)Consequences of Discontinuing Knowledge Work Automation - Surfacing of Deskilling Effects and Methods of Recovery., , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2018)What Do We Really Mean by Rigor in Information Systems Research?, and . HICSS, page 1-10. ScholarSpace, (2022)Understanding Continued Use of Crowdsourcing Systems: An Interpretive Study., and . J. Theor. Appl. Electron. Commer. Res., 10 (1): 1-18 (2015)Research Perspectives: Reconsidering the Role of Research Method Guidelines for Interpretive, Mixed Methods, and Design Science Research., , and . J. Assoc. Inf. Syst., 22 (4): 1 (2021)Crowdsourcing as a Mobile Service - Case Study: Publishing Photography., and . ECIS, page 115. (2012)Conflict Resolution in an ISO/IEC 27001 Standard Implementation: A Contradiction Management Perspective., and . HICSS, page 4839-4848. ScholarSpace, (2023)Understanding Crowdturfing: the Different Ethical Logics behind the Clandestine Industry of Deception., and . ECIS, page 124. (2017)Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions., , and . Data Base, 53 (1): 25-60 (2022)The Vicious Circles of Skill Erosion: A Case Study of Cognitive Automation., , , , and . J. Assoc. Inf. Syst., 24 (5): 2 (2023)