Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scandinavian view on the ACM's Code of Ethics., and . SIGCAS Comput. Soc., 24 (2): 14-20 (1994)A Theory of Rural Telehealth Innovation - A Paradoxical Approach., , and . ICIS, page 126. Association for Information Systems, (2009)The Role of Events in Actor Network Analysis of IT-Based Change., , and . AMCIS, page 49. Association for Information Systems, (2005)Chains of Control in Agile Software Development., , and . AMCIS, Association for Information Systems, (2013)The Role of Conventional Research Methods in Information Systems Action Research., and . Relevant Theory and Informed Practice, volume 143 of IFIP, page 335-352. Springer, (2004)Managing Risks in Distributed Software Projects: An Integrative Framework., , , , and . IEEE Trans. Engineering Management, 56 (3): 508-532 (2009)Representation and mediation in digitalized work: evidence from maintenance of mining machinery., , and . JIT, 33 (3): 216-232 (2018)Formalization in Systems Development., and . TAPSOFT, Vol.2, volume 186 of Lecture Notes in Computer Science, page 101-116. Springer, (1985)Data Breach Risks and Resolutions: A Literature Synthesis., , , and . AMCIS, Association for Information Systems, (2019)Revenue Cycle Management in the Wake of EMR Implementation: A Competing Logics Perspective., , and . HICSS, page 1-10. ScholarSpace, (2021)