Author of the publication

IS 2010: Curriculum Guidelines for Undergraduate Degree Programs in Information Systems.

, , , , , , and . Commun. Assoc. Inf. Syst., (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting the Impact of System Use on Task Performance: An Exploitative-Explorative System Use Framework., , and . J. AIS, 20 (4): 3 (2019)Extending Ecommerce Deception Theory to Phishing., , and . ICIS, Association for Information Systems, (2014)Understanding online customers' ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty., , , and . Eur. J. Inf. Syst., 23 (2): 185-204 (2014)Research Note - Using Expectation Disconfirmation Theory and Polynomial Modeling to Understand Trust in Technology., , , and . Inf. Syst. Res., 27 (1): 197-213 (2016)AMCIS 2021 Awards and Closing Ceremony., , , , , , , , , and . AMCIS, Association for Information Systems, (2021)Social Media and Emergency Management: Exploring State and Local Tweets., , and . HICSS, page 1968-1977. IEEE Computer Society, (2014)Privacy, Accuracy, and Accessibility of Digital Business., and . Computing Handbook, 3rd ed. (2), CRC Press, (2014)Old Wine in New Bottles: Investigating how Information Technology is Enabling Öld Criminals" to access "New Venues"., , and . AMCIS, page 418. Association for Information Systems, (2010)Combating Phishing Attacks: A Knowledge Management Approach., , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Assessing Common Method Bias: Problems with the ULMC Technique., , and . MIS Q., 36 (3): 1003-1019 (2012)