Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing Individuals' Transactive Memories of Their Ego-Centric Networks to Mitigate Risks of Knowledge Sharing: The Case of Professionals Protecting CyberSecurity., and . ICIS, Association for Information Systems, (2005)Online Discussion Boards for Technical Support: The Effect of Token Recognition on Customer Contributions., and . ICIS, page 110-120. Association for Information Systems, (2003)Improving Knowledge Work Processes, , and . Sloan Management Review, 37 (4): 53--65 (1996)Panel: IS Professors in the Electronic World - Digging Their Graves or Digging a Goldmine?, , , , and . ECIS, page 1403-1404. (2000)Understanding the effects of member diversity in global virtual teams., and . ECIS, page 365-377. Euro-Arab Management School, (1998)Habit Formation in Online Communities., , , and . ICIS, page 189. Association for Information Systems, (2009)JAIS Theory Building Master Class: Revising Papers Based on Reviewer Feedback and Discussion., and . AMCIS, page 401. Association for Information Systems, (2005)How do Entrepreneurial Firms Appropriate Value in Bio Data Infrastructures: an Exploratory Qualitative Study., , and . ECIS, (2019)Information technology alignment or "fit" in highly turbulent environments: the concept of flexibility., and . SIGCPR, page 1-14. ACM, (1994)Supply/Demand of IS Doctorates in the 1990s., , and . Commun. ACM, 34 (1): 86-99 (1991)