Author of the publication

Are Prevailing Theories and Practices of IS Security Management Adequate? An Evaluation and Call to Action.

, , , , and . AMCIS, page 400. Association for Information Systems, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Process Oriented Framework for Assessing the Business Value of Information Technology., , and . ICIS, page 17-27. Association for Information Systems, (1995)Panel: Will the Internet Really Revolutionise the Business School and Business Education?, , , , and . ECIS, page 1529-1531. Cork Publishing Ltd, (1997)Collaborative Autonomy for Mapping, Search, and Pursuit., , and . Unmanned Systems, 4 (2): 167-184 (2016)Cloud Computing., , and . Computing Handbook, 3rd ed. (2), CRC Press, (2014)CIO Roles and Responsibilities: Twenty-Five Years of Evolution and Change., and . AMCIS, page 376. Association for Information Systems, (2006)Are Prevailing Theories and Practices of IS Security Management Adequate? An Evaluation and Call to Action., , , , and . AMCIS, page 400. Association for Information Systems, (2005)Doing IT Research that Matters to Practice: Perspectives on Propositions., , , , and . ICIS, page 44. Association for Information Systems, (2009)The Current State of Business Intelligence in Academia: The Arrival of Big Data., , , , , , , , , and . Commun. Assoc. Inf. Syst., (2014)A Process Oriented Framework for Assessing the Business Value of Information Technology., , and . Data Base, 27 (2): 68-81 (1996)Hybrid Learning Systems: Meeting the Challenges of Graduate Management Education., and . ICHL, volume 6248 of Lecture Notes in Computer Science, page 35-48. Springer, (2010)