Author of the publication

Information Systems Outsourcing (Introduction to the Special Section).

, , and . Commun. ACM, 39 (7): 27-28 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ethical Challenges in the Future of Work., , , , and . IEEE Data Eng. Bull., 42 (4): 55-64 (2019)Misinformation Sharing on Twitter During Zika: An Investigation of the Effect of Threat and Distance., , , and . IEEE Internet Comput., 25 (1): 31-39 (2021)A dynamic learning model for on-line quality control using the TAGUCHI approach., , and . Appl. Artif. Intell., 6 (4): 459-484 (1992)Knowledge Acquisition via Three Learning Processes in Enterprise Information Portals: Learning-by-Investment, Learning-by-Doing, and Learning-from-Others., , , and . MIS Q., 29 (2): 245-278 (2005)Journal Self-Citation VIII: An IS Researcher in the Dual Worlds of Author-Reader and Author-Institution., and . Commun. Assoc. Inf. Syst., (2009)A choice set-sensitive analysis of preference information acquisition about discrete resources.. IEEE Trans. Syst. Man Cybern., 23 (4): 1062-1071 (1993)Toward an Integration of Agent- and Activity-Centric Approaches in Organizational Process Modeling: Incorporating Incentive Mechanisms., , and . Inf. Syst. Res., 15 (4): 316-335 (2004)To Participate Or Not To Participate: An Investigation Of Strategic Participation In Standards., , , and . CoRR, (2022)Design principles for critical incident response systems., , , and . Inf. Syst. E Bus. Manag., 5 (3): 201-227 (2007)An exploration of risk information search via a search engine: Queries and clicks in healthcare and information security., , and . Decis. Support Syst., 52 (2): 395-405 (2012)