Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer Mediated Negotiations and Deception., , , and . Handbook of Research on Computer Mediated Communication, IGI Global, (2008)Desktop Computerization as a Continuing Process., , and . ICIS, page 31. Association for Information Systems, (1990)Does IT Capability and Competitive Actions Shape Firm Profitability?, , and . ICIS, Association for Information Systems, (2017)Behind Cyber Doors: Securing the Internet of Self., and . AMCIS, Association for Information Systems, (2018)Privacy in the Age of Big Data: The Challenges and Opportunities for Privacy Research., , , , , , and . ICIS, Association for Information Systems, (2014)Commitment, Trust, and Social Involvement: An Exploratory Study of Antecedents to Web Shopper Loyalty., and . J. Organ. Comput. Electron. Commer., 14 (4): 243-268 (2004)Cross-cultural deception in social networking sites and face-to-face communication., and . Comput. Hum. Behav., 24 (6): 2945-2964 (2008)Virtual Team Effectiveness: Investigating the Moderating Role of Experience with Computer-Mediated Communication on the Impact of Team Cohesion and Openness., , , , and . JOEUC, 25 (2): 1-18 (2013)Exploring the Software Engineering Component in MIS Research., and . Commun. ACM, 38 (7): 80-91 (1995)The Adequacy of Office Models., , , and . Advances in Computers, (1995)