Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gray-Area Phenomenon In Information Systems Development: A Call For Research., , and . PACIS, page 198. Queensland University of Technology, (2011)What levels of moral reasoning and values explain adherence to information security rules? An empirical study., , , , and . Eur. J. Inf. Syst., 18 (2): 126-139 (2009)Project-Based IT Companies and Three Corporate Moral Dilemmas.. AMCIS, Association for Information Systems, (2012)Patterns of Enterprise Architecture Adoption in the Public Sector: a Resource-based Perspective., , and . ECIS, (2019)Development of an Agile Requirements Risk Prioritization Method: A Design Science Research Study., , , and . Commun. Assoc. Inf. Syst., (2022)Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice., and . Inf. Syst. J., 14 (4): 387-407 (2004)Moral Conflicts in Teaching Project Work: A Job Burdened by Role Strains.. Commun. Assoc. Inf. Syst., (2007)Towards Establishing Principles for Designing Cybersecurity Simulations of Cyber-Physical Artefacts in Real-Time Simulation., , and . ISD, Universitat Politècnica de València / Association for Information Systems, (2021)How to Incorporate Accessibility to Design Principles for IS Artefacts?, and . EJC, volume 380 of Frontiers in Artificial Intelligence and Applications, page 167-178. IOS Press, (2023)A Study of Computer Science Students' Ethical Attitudes and Its Implications to.. SIGCAS Comput. Soc., 33 (3): 3 (2003)