Author of the publication

Knowledge Sourcing: A Channel Preference Perspective.

, , and . AMCIS, page 218. Association for Information Systems, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Tools for System Administrators: An Empirical Test of the Integrated User Satisfaction Model., , and . LISA, page 1-8. USENIX Association, (2008)Data in the Wild: A KM Approach to Doing a Census Without Asking Anyone and the Issue of Privacy., , , , and . HICSS, page 1-10. ScholarSpace, (2019)Introduction to Confidentiality, Integrity, and Availability of Knowledge and Data Minitrack., and . HICSS, page 1. ScholarSpace / AIS Electronic Library (AISeL), (2017)The Paradox of Choice: Digital Akrasia in the Deployment of Multi-Factor Authentication., , and . HICSS, page 4774-4783. ScholarSpace, (2024)Knowledge Systems and Risk Management: Threat Lessons Learned from COVID-19 in 2020-21., , and . HICSS, page 1-10. ScholarSpace, (2022)The Impact of Organizational Citizenship Behaviors on Technostress in a Post-COVID-19 Remote Work Context: The Role of Media Synchronicity., , and . HICSS, page 6096-6106. ScholarSpace, (2024)Assessing Knowledge Loss Risk., and . HICSS, page 3478-3487. IEEE Computer Society, (2013)Combating Phishing Attacks: A Knowledge Management Approach., , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Sysadmins and the need for verification information., and . CHIMIT, page 4. ACM, (2008)On Not Falling for Phish: Examining Multiple Stages of Protective Behavior of Information System End-Users., , and . ICIS, Association for Information Systems, (2012)