Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual worlds: multi-disciplinary research opportunities, and . SIGMIS Database, 38 (4): 17--25 (October 2007)A group decision support system for idea generation and issue analysis in organization planning., , and . CSCW, page 16-34. ACM, (1986)A Model for Specification of Office Communications., , and . IEEE Trans. Commun., 30 (1): 27-36 (1982)Delegation Technologies: Environmental Scanning with Intelligent Agents., and . J. Manag. Inf. Syst., 8 (1): 37-62 (1991)It's a Dangerous Business, Going Out Your Door: Overcoming Institutional Distances Through IS., , , and . ICIS, Association for Information Systems, (2021)An Examination of the Interaction between Technology, Methodology and Information Systems: a tripartite View ·., and . ICIS, page 23. Association for Information Systems, (1980)A Knowledge Based Approach for Resource Management., , , , and . ICIS, page 42. Association for Information Systems, (1987)Strategic and Institutional Perspectives in the Adoption and Early Integration of Radio Frequency Identification (RFID)., , and . HICSS, page 224. IEEE Computer Society, (2007)Incentives and Perceptions of Information Security Risks., , and . ICIS, page 25. Association for Information Systems, (2008)Second Life and other Virtual Worlds: A Roadmap for Research., , , , , , and . ICIS, page 4. Association for Information Systems, (2007)