409 results on '"Hedström, Karin"'
Search Results
2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management
3. How education professionals manage personal and professional boundaries when using social technologies.
4. Complications after breast augmentation with dermal fillers containing copolyamide : A systematic review
5. Information and Communication Technology for Managing Social Isolation and Loneliness Among People Living With Parkinson Disease : Qualitative Study of Barriers and Facilitators
6. Complications after breast augmentation with dermal fillers containing copolyamide: A systematic review
7. Value-Based Compliance Theory
8. Reconciling value-based objectives for security and identity management
9. Ensuring Core Competencies for Cybersecurity Specialists
10. Challenges of introducing a professional eID card within health care
11. Uncovering Situations of Cargo Cult Behavior in Agile Software Development Method Use
12. Societal digitalization, value dilemma and the ’digital first’ paradigm : The broader questions of contract tracing apps in the post pandemic period
13. Management of social isolation and loneliness in Parkinson’s disease : Design principles
14. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management
15. Institutional Re-design for a Digital Era - Learning from Cases of Automation
16. Ledarskap för ett hållbart arbetsliv : Teknikstrategier och arbetslivets gränser
17. Information and communication technology for managing social isolation and loneliness among people living with Parkinson’s disease: Barriers and Facilitators (Preprint)
18. Information and Communication Technology for Managing Social Isolation and Loneliness among People Living with Parkinson’s Disease: A Qualitative Study of Barriers and Facilitators (Preprint)
19. Uncovering Situations of Cargo Cult Behavior in Agile Software Development Method Use
20. Citizens’ attitudes towards automated decision-making
21. Social action theory for understanding information security non-compliance in hospitals : The importance of user rationale
22. The values of IT in elderly care
23. Accountability in re-arranged relations when Robotic Process Automation (RPA) becomes a co-worker
24. Sociala medier i skolan : Styrningslöshet i en värld av styrning
25. Customized Information and Communication Technology for Reducing Social Isolation and Loneliness Among Older Adults : Scoping Review
26. “Standardizing information security – a structurational analysis”
27. Citizens' attitudes towards automated decision-making
28. Customized Information and Communication Technology for Reducing Social Isolation and Loneliness Among Older Adults: Scoping Review
29. “Standardizing Information Security – a Structurational Analysis”
30. Practice-Based Discourse Analysis of InfoSec Policies
31. Customised Information and Communication Technology for Reducing Social Isolation and Loneliness Among Older Adults: A Systematic Review (Preprint)
32. Attempts to share information between public sector organisations over time: A case-based exploration of value conflicts
33. Attempts to share information between public sector organisations over time : A case-based exploration of value conflicts
34. Teachers falling off the cliff affordances and constraints of social media in school
35. Citizen Diversity in e-Government Research : Moving the Field Forward
36. Value-Based Compliance Theory
37. End User Development and Information Security Culture
38. Analyzing Information Security Goals
39. Taking Initial Steps towards Enterprise Architecture in Local Government
40. Using Actor Network Theory to Understand Information Security Management
41. Towards a Roadmap for User Involvement in E-Government Service Development
42. Negotiating a Systems Development Method
43. Teachers Falling off the Cliff Affordances and Constraints of Social Media in School
44. Citizen Diversity in e-Government Research: Moving the Field Forward
45. Consensus versus warfare – unveiling discourses in de jure information security standard development
46. Medborgarnas inställning till automatiserat beslutsfattande
47. The Socio-Political Construction of CareSys
48. The Use of Research-Based Information System Development Methods
49. Consensus versus warfare – unveiling discourses in de jure information security standard development
50. Medborgarna och automatiserat beslutsfattande
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.