Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine learning advice in managerial decision-making: The overlooked role of decision makers' advice utilization., , , , and . J. Strateg. Inf. Syst., 32 (4): 101790 (December 2023)Constant Checking Is Not Addiction: A Grounded Theory of IT-Mediated State-Tracking., and . MIS Q., (2020)Coordinating Human and Machine Learning for Effective Organizational Learning., , , , , , , and . MIS Q., (2021)Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments., , and . Inf. Syst. Frontiers, 21 (6): 1285-1305 (2019)Work, Home, and Technology: Towards a Framework of IT-Based Boundary Management.. ECIS, page 85. (2018)Overcoming the Single-IS Paradigm in Individual-Level IS Research., and . Inf. Syst. Res., 33 (2): 476-488 (2022)The Influence of SME Constraints on Organizational IT Security., and . ICIS, Association for Information Systems, (2018)How employees gain meta-knowledge using enterprise social networks: A validation and extension of communication visibility theory., , , and . J. Strateg. Inf. Syst., 28 (3): 292-309 (2019)Business Intelligence & Analytics and Decision Quality - Insights on Analytics Specialization and Information Processing Modes., and . ECIS, (2015)Flamingos on a slackline: Companies' challenges of balancing the competing demands of handling customer information and privacy., , , and . Inf. Syst. J., 29 (2): 548-575 (2019)