Seuraa
Steffi Haag
Steffi Haag
Heinrich Heine University (HHU) Düsseldorf
Vahvistettu sähköpostiosoite verkkotunnuksessa hhu.de
Nimike
Viittaukset
Viittaukset
Vuosi
Shadow IT
S Haag, A Eckhardt
Business & Information Systems Engineering 59 (6), 469-473, 2017
792017
Literature Reviews in IS Research: What Can Be Learnt from the Past and Other Fields?
G Schryen, A Benlian, F Rowe, G Shirley, K Larsen, S Petter, G Paré, ...
Communications of the AIS, 2017
662017
Organizational Inertia as Barrier to Firms’ IT Adoption–Multidimensional Scale Development and Validation
S Haag
592014
Organizational cloud service adoption: a scientometric and content-based literature analysis
S Haag, A Eckhardt
Journal of Business Economics 84 (3), 407-440, 2014
582014
Normalizing the Shadows–The Role of Symbolic Models for Individuals’ Shadow IT Usage
S Haag, A Eckhardt
582014
Are Shadow System Users the Better IS Users?–Insights of a Lab Experiment
S Haag, A Eckhardt, C Bozoyan
542015
Appearance of Dark Clouds?-An Empirical Analysis of Users' Shadow Sourcing of Cloud Services.
S Haag
Wirtschaftsinformatik, 1438-1452, 2015
452015
Organizational resistance to e-invoicing–Results from an empirical investigation among SMEs
S Haag, F Born, S Kreuzer, S Bernius
Electronic Government: 12th IFIP WG 8.5 International Conference, EGOV 2013 …, 2013
442013
Protection motivation theory in information systems security research: A review of the past and a road map for the future
S Haag, M Siponen, F Liu
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 52 (2 …, 2021
432021
Digitale Zwillinge–Eine explorative Fallstudie zur Untersuchung von Geschäftsmodellen
R Klostermeier, S Haag, A Benlian
HMD Praxis der Wirtschaftsinformatik: Vol. 55, No. 2, 2018
422018
Geschäftsmodelle digitaler zwillinge
R Klostermeier, S Haag, A Benlian
Geschäftsmodelle digitaler Zwillinge: HMD Best Paper Award 2018, 1-35, 2020
372020
Justifying Shadow IT Usage
S Haag, A Eckhardt
Proceedings of the 19th Pacific Asia Conference on Information Systems …, 2015
362015
The Acceptance of Justifications among Shadow IT Users and Nonusers–An Empirical Analysis
S Haag, A Eckhardt, A Schwarz
Information & Management 56 (5), 731-741, 2019
312019
Sensitizing Employees’ Corporate IS Security Risk Perception
S Haag, A Eckhardt
232014
How Information Security Requirements Stress Employees
C Ament, S Haag
222016
From the Ground to the Cloud - A Structured Literature Analysis of the Cloud Service Landscape around the Public and Private Sector
S Haag, A Eckhardt, J Krönung
2014 47th Hawaii International Conference on System Sciences, 2127-2136, 2014
132014
Deviant Affordances: When Tensions, Deadlocks, and Nonconformance Generate Performance
S Haag, A Eckhardt, V Venkatesh
Management Information Systems Quarterly 46 (4), 2111-2162, 2022
9*2022
Freedom of Technology Choice: An Experimental Evaluation
M Klesel, S Haag, FM Oschinsky, K Ortbach
72019
Who is to blame? How too much information threatens users' IS continuance - an experimental analysis
S Wallbach, S Haag
26th European Conference on Information Systems, 2018
7*2018
Security-related Stress - A Neglected Construct Information Systems Stress literature
C Ament, S Haag
72016
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20