Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Social Media Trap - How Knowledge Workers Learn to Deal with Constant Social Connectivity., , and . HICSS, page 2115-2124. IEEE Computer Society, (2016)Knowledge Management without Management - Shadow IT in Knowledge-Intensive manufacturing Practices., , , and . ECIS, page 106. (2017)From pragmatist to Passenger - a Q Methodological Study of connectivity Types., , , and . ECIS, page Research Paper 125. (2016)Knowledge Management in the Dark: The Role of Shadow IT in Practices in Manufacturing., , , and . IJKM, 15 (2): 1-19 (2019)Connectivity as a Two-Edged Sword: Mirroring the Multifaceted Field of Constant Connectivity.. Wirtschaftsinformatik, page 1527-1541. (2015)IT-Supported Formal Control: How Perceptual (in)Congruence Affects the Convergence of Crowd-Sourced Ideas., , , , , and . ICIS, Association for Information Systems, (2016)Digital Technology for Preserving Cultural Heritage in Tonga., , and . ICT4D (2), volume 552 of IFIP Advances in Information and Communication Technology, page 215-226. Springer, (2019)"we Need to Talk!" - Project Teams Dealing with low connectivity., , , and . ECIS, page 42. (2017)Not Just Another Type of Resistance - towards a Deeper Understanding of Supportive non-Use., , , , , , and . ECIS, page 150. (2017)From Isolation to Collaboration - How the Increasing diffusion of Mobile Devices has changed Practices of Knowledge Sharing in non-Office Settings., , , , , , and . ECIS, page Research Paper 62. (2016)