Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knowledge hiding in organizations, , , and . Journal of Organizational Behavior, 33 (1): 64-88 (2012)The Effects of Competition and Time Constraints on Knowledge Transfer: Exploratory Findings from Two Experiments., , , , and . HICSS, page 1-10. IEEE Computer Society, (2009)In Justice We Trust: Predicting User Acceptance of E-Customer Services., , and . J. Manag. Inf. Syst., 24 (4): 123-151 (2008)Service with an E-Smile: Employee Authenticity and Customer Usage of Web-Based Services., , and . HICSS, page 1-10. IEEE Computer Society, (2011)Too Busy to Help: Antecedents and Outcomes of Interactional Justice in Web-Based Service Encounters., and . AMCIS, Association for Information Systems, (2012)Strategic value alignment for information security management: a critical success factor analysis., , , and . Inf. Comput. Secur., 26 (2): 150-170 (2018)Information systems research and Hofstede's culture's consequences: an uneasy and incomplete partnership., , and . IEEE Trans. Engineering Management, 50 (1): 8-25 (2003)Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model., , , and . J. Manag. Inf. Syst., 28 (2): 203-236 (2011)Evasive knowledge hiding in academia: when competitive individuals are asked to collaborate., , , , and . J. Knowl. Manag., 23 (4): 597-618 (2019)