Author of the publication

Critical Theory as an Approach to the Ethics of Information Security.

, , , and . Sci. Eng. Ethics, 20 (3): 675-699 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A re-conceptualization of the interpretive flexibility of information technologies: redressing the balance between the social and the technical., , and . EJIS, 15 (6): 569-582 (2006)An investigation of the factors affecting the successful treatment of organisational issues in systems development projects., and . EJIS, 10 (3): 147-160 (2001)Improving the impact of IT development projects: the benefits realization capability model., , and . EJIS, 17 (4): 352-370 (2008)The role of IS capabilities in delivering sustainable improvements to competitive positioning., and . J. Strategic Inf. Sys., 18 (2): 100-116 (2009)The application of information security policies in large UK-based organizations: an exploratory investigation., and . Inf. Manag. Comput. Security, 11 (3): 106-114 (2003)A Statistical Evaluation of Earl's Five Approaches to Strategic Information Systems Planning., , and . ECIS, page 117-128. Copenhagen Business School, (1999)Benefits Realization from ERP Systems: the Role of Customization., , and . ECIS, page 142. (2012)An In-Depth Investigation into the Impact of Information Quality Upon the Perceived Value of Information., , and . IQ, page 138-152. MIT, (2001)The relative success of alternative approaches to strategic information systems planning: an empirical analysis., , and . J. Strategic Inf. Sys., 8 (3): 263-283 (1999)The information security policy unpacked: A critical study of the content of university policies., , and . Int J. Information Management, 29 (6): 449-457 (2009)