Steffi Haag

According to our database1, Steffi Haag authored at least 20 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
How Can the BISE Community Promote Tech Startups?
Bus. Inf. Syst. Eng., August, 2023

Negotiating with LLMS: Prompt Hacks, Skill Gaps, and Reasoning Deficits.
CoRR, 2023

Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals.
Commun. Assoc. Inf. Syst., 2023

2022
Developing Design Principles for Green IS Facilitating Sustainable User Behavior: A Design Science Research Approach.
Proceedings of the WI for Grand Challenges, 2022

Identifying Customer Values of B2C-Fintech Services in the Area of Personal Financial Management.
Proceedings of the WI for Grand Challenges, 2022

2021
Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future.
Data Base, 2021

2019
The Acceptance of Justifications among Shadow IT Users and Nonusers - An Empirical Analysis.
Inf. Manag., 2019

Freedom of Technology Choice: An Experimental Evaluation.
Proceedings of the 40th International Conference on Information Systems, 2019

2018
Digitale Zwillinge - Eine explorative Fallstudie zur Untersuchung von Geschäftsmodellen.
HMD Prax. Wirtsch., 2018

2017
Literature Reviews in IS Research: What Can Be Learnt from the Past and Other Fields?
Commun. Assoc. Inf. Syst., 2017

Shadow IT.
Bus. Inf. Syst. Eng., 2017

2016
How Information Security Requirements Stress Employees.
Proceedings of the International Conference on Information Systems, 2016

Security-Related stress - a Neglected Construct in Information Systems stress literature.
Proceedings of the 24th European Conference on Information Systems, 2016

2015
Appearance of Dark Clouds? - An Empirical Analysis of Users' Shadow Sourcing of Cloud Services.
Proceedings of the Smart Enterprise Engineering: 12. Internationale Tagung Wirtschaftsinformatik, 2015

Justifying Shadow IT Usage.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

Are Shadow System Users the Better IS Users? - Insights of a Lab Experiment.
Proceedings of the International Conference on Information Systems, 2015

2014
Sensitizing Employees' Corporate IS Security Risk Perception.
Proceedings of the International Conference on Information Systems, 2014

Normalizing the Shadows - The Role of Symbolic Models for Individuals' Shadow IT Usage.
Proceedings of the International Conference on Information Systems, 2014

From the Ground to the Cloud - A Structured Literature Analysis of the Cloud Service Landscape around the Public and Private Sector.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Organizational Resistance to E-Invoicing - Results from an Empirical Investigation among SMEs.
Proceedings of the Electronic Government - 12th IFIP WG 8.5 International Conference, 2013


  Loading...