Author of the publication

The Institutionalization of IT Budgeting: Empirical Evidence from the Financial Sector.

, and . Inf. Resour. Manag. J., 19 (1): 84-97 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active disturbance rejection control approach to the output tracking of PDEs with general disturbances: A new perspective., , and . Autom., (2024)The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective., , and . J. Manag. Inf. Syst., 31 (4): 6-48 (2015)A Task-based Comparison of Linguistic and Semantic Document Retrieval Methods in the Medical Domain., , , , , and . EMSA-RMed@ESWC, volume 1613 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)A DesignTheory for Human-Computer Negotiation Strategy., , and . AMCIS, Association for Information Systems, (2020)Turing Instability of a Modified Reaction-Diffusion Holling-Tanner Model Over a Random Network., and . Int. J. Bifurc. Chaos, 32 (4): 2250049:1-2250049:18 (2022)An Empirical Study of the Casual Relationship Between IT Investment and Firm Performance., and . Inf. Resour. Manag. J., 14 (3): 15-26 (2001)Evaluating Alternative Software Production Functions.. IEEE Trans. Software Eng., 23 (6): 379-387 (1997)How Organizational Culture Shapes Competitive Strategies: a Comparative Case Study of Two E-Commerce Firms in China., , and . PACIS, page 102. AISeL, (2008)Antecedents and consequences of trust in supply chain: the role of information technology., , , and . ECIS, page 42. (2011)Top Management Championship and Individual Behaviour Towards Information Security: An Integrative Model., , , and . ECIS, page 1310-1321. (2008)