Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online business reporting: An information management perspective., , and . Int. J. Inf. Manag., 26 (2): 91-101 (2006)Information security governance practices in critical infrastructure organizations: A socio-technical and institutional logic perspective., , and . Electron. Mark., 23 (4): 341-354 (2013)Competing in the Message Market: A Teaching Case., and . Bled eConference, page 30. (2009)Managing Information Risks and Protecting Information Assets in a Web 2.0 Era., and . Bled eConference, page 25. (2010)Enterprise Collaboration Systems: An Analysis and Classification of Adoption Challenges., and . CENTERIS/ProjMAN/HCist, volume 100 of Procedia Computer Science, page 179-187. Elsevier, (2016)Designs for the Digital Workplace., and . CENTERIS/ProjMAN/HCist, volume 138 of Procedia Computer Science, page 478-485. Elsevier, (2018)Social Business Documents., and . CENTERIS/ProjMAN/HCist, volume 64 of Procedia Computer Science, page 360-368. Elsevier, (2015)Visualizing Social Documents as Traces of Collaborative Activity in Enterprise Collaboration Platforms., , and . HICSS, page 1-10. ScholarSpace, (2020)Monitoring and Understanding Enterprise Collaboration Platform Outcomes and Benefits Change., and . HICSS, page 1-10. ScholarSpace, (2020)Information Security Governance: Investigating Diversity in Critical Infrastructure Organizations., , and . Bled eConference, page 13. (2012)