From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploring Information Systems Control Alignment in Organizations., , , и . ICIS, Association for Information Systems, (2011)Perceptions of control legitimacy in information systems development., и . Inf. Technol. People, 31 (3): 712-740 (2018)Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable within Behavioral Cybersecurity Research., и . HICSS, стр. 4139-4148. ScholarSpace, (2023)Have Your Cake and Eat it Too? Managing Knowledge in Hybrid Agile-Traditional Development Projects., и . AMCIS, Association for Information Systems, (2015)Why Do You Control? The Concept of Control Purpose and Its Implications for IS Project Control Research., , , , и . ICIS, Association for Information Systems, (2015)Show-and-Tell or Hide-and-Seek? Examining Organizational Cybersecurity Incident Notifications., и . HICSS, стр. 1-10. ScholarSpace, (2022)The View from the Top - How Senior Executives Exercise control over Information Systems Projects to Enhance Performance., , и . ECIS, стр. 92. (2017)How Control Configurations and Enactments Shape Legitimacy Perceptions and Compliance Intentions in IS Development Projects., , , и . ECIS, (2020)'What a waste of time': An examination of cybersecurity legitimacy., и . Inf. Syst. J., 33 (6): 1396-1422 (ноября 2023)(Re)considering the Concept of Reproducibility of Information Systems Literature Reviews.. AMCIS, Association for Information Systems, (2019)