Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Growing Pains with Information Overload., and . IEEE Computer, 43 (6): 94-96 (2010)Virtual Space and Place: Theory and Test., , , , and . MIS Quarterly, 35 (4): 1079-1098 (2011)So ... Thinking of Retiring?, , , , and . AMCIS, Association for Information Systems, (2014)Who Is the Favored Bride? Challenges in Switching to a Multi-vendor Offshoring Strategy., and . Information Systems Outsourcing, Springer, (2014)Interorganizational trust in B2B relationships., , , and . ICEC, volume 60 of ACM International Conference Proceeding Series, page 272-279. ACM, (2004)A subtle war of words on the internet., and . IJEB, 6 (4): 342-353 (2008)Decision Making, IT Governance, and Information Systems Security., and . AMCIS, page 459. Association for Information Systems, (2005)Senior Scholars Panel: What Do We Like About the IS Field?, , , , and . ICIS, page 60. Association for Information Systems, (2009)Why Do You Control? The Concept of Control Purpose and Its Implications for IS Project Control Research., , , , and . ICIS, Association for Information Systems, (2015)The use of temporary managers and employees in a local government information systems services department., , and . SIGCPR, page 110-115. ACM, (1998)