Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems., , , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 352-363. Springer, (2012)Developing Integrated Solutions in the Health Care Environment: A Case Study., and . ECIS, page 1163-1172. (1996)Developing A Networked Authority: Nature and Significance of Power Relationships., , and . ECIS, page 511-525. Cork Publishing Ltd, (1997)Factors Affecting the Use and Adoption of EDI in Manufacturing SMEs: Experiences From Portugal., and . ECIS, page 1184-1190. Cork Publishing Ltd, (1997)Panel: Developing An Ethical Agenda for A Networked Workplace., , , , and . ECIS, page 1535-1536. Cork Publishing Ltd, (1997)Electronic thesaurus for clinical terms: A methodological approach., and . ECIS, page 591-600. (1995)Semiotic Analysis of Knowledge Intensive Business Processes: Developing Interpretations for Sustainable Competitive Advantage., and . AMCIS, page 389. Association for Information Systems, (2005)Value-Focused Assessment of Information System Security in Organizations., and . ICIS, page 561-566. Association for Information Systems, (2001)Using Actor Network Theory to Understand Information Security Management., , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 43-54. Springer, (2010)What Interrupts Intention to Comply with IS-Security Policy?, and . AMCIS, Association for Information Systems, (2016)