Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What levels of moral reasoning and values explain adherence to information security rules? An empirical study., , , , and . Eur. J. Inf. Syst., 18 (2): 126-139 (2009)Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice., and . Inf. Syst. J., 14 (4): 387-407 (2004)Gray-Area Phenomenon In Information Systems Development: A Call For Research., , and . PACIS, page 198. Queensland University of Technology, (2011)Project-Based IT Companies and Three Corporate Moral Dilemmas.. AMCIS, Association for Information Systems, (2012)Moral Conflicts in Teaching Project Work: A Job Burdened by Role Strains.. Commun. Assoc. Inf. Syst., (2007)Development of an Agile Requirements Risk Prioritization Method: A Design Science Research Study., , , and . Commun. Assoc. Inf. Syst., (2022)Patterns of Enterprise Architecture Adoption in the Public Sector: a Resource-based Perspective., , and . ECIS, (2019)Errors and Complications in SQL Query Formulation., , and . ACM Trans. Comput. Educ., 18 (3): 15:1-15:29 (2018)Towards Establishing Principles for Designing Cybersecurity Simulations of Cyber-Physical Artefacts in Real-Time Simulation., , and . ISD, Universitat Politècnica de València / Association for Information Systems, (2021)How to Incorporate Accessibility to Design Principles for IS Artefacts?, and . EJC, volume 380 of Frontiers in Artificial Intelligence and Applications, page 167-178. IOS Press, (2023)