Tero Vartiainen

Orcid: 0000-0003-3843-8561

According to our database1, Tero Vartiainen authored at least 57 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cyber Security in Energy Informatics: A Non-technical Perspective.
CoRR, 2024

Development of Cybersecurity Simulator-Based Platform for the Protection of Critical Infrastructures.
CoRR, 2024

Explanations of Insider Deviant Behavior in Information Security: A Systematic Literature Review.
Commun. Assoc. Inf. Syst., 2024

Requirements Risk Management for Continuous Development: Organisational Needs.
Australas. J. Inf. Syst., 2024

2023
Enhancing data security against cyberattacks in artificial intelligence based smartgrid systems with crypto agility.
CoRR, 2023

How Personal Finance Management Systems Emancipate and Oppress Young People.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

How to Incorporate Accessibility to Design Principles for IS Artefacts?
Proceedings of the Information Modelling and Knowledge Bases XXXV, 2023

2022
Development of an Agile Requirements Risk Prioritization Method: A Design Science Research Study.
Commun. Assoc. Inf. Syst., 2022

Factors Affecting the Accessibility of IT Artifacts: A Systematic Review.
Commun. Assoc. Inf. Syst., 2022

What if gamified software is fully proactive? Towards autonomy-related design principles.
Proceedings of the 17th International Conference on Persuasive Technology, 2022

Towards A Massive Open Online Course for Cybersecurity in Smart Grids - A Roadmap Strategy.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe, 2022

Platformization Practices of Health Information Systems: A Case of National eHealth Platforms.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Towards Establishing Principles for Designing Cybersecurity Simulations of Cyber-Physical Artefacts in Real-Time Simulation.
Proceedings of the Information Systems Development: Crossing Boundaries between Development and Operations (DevOps) in Information Systems (ISD2021 Proceedings), 2021

Modern Trends and Skill Gaps of Cyber Security in Smart Grid : Invited Paper.
Proceedings of the 19th IEEE International Conference on Smart Technologies, 2021

State of the Art in Cybersecurity and Smart Grid Education.
Proceedings of the 19th IEEE International Conference on Smart Technologies, 2021

2020
Machine Learning for Prognosis of Oral Cancer: What Are the Ethical Challenges?
Proceedings of the Conference on Technology Ethics, Tethics 2020, 2020

Changing Patterns in the Process of Digital Transformation Initiative in Established Firms: The Case of an Energy Sector Company.
Proceedings of the 24th Pacific Asia Conference on Information Systems, 2020

2019
Digital strategy patterns in information systems research.
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019

Patterns of Enterprise Architecture Adoption in the Public Sector: a Resource-based Perspective.
Proceedings of the 27th European Conference on Information Systems, 2019

2018
Errors and Complications in SQL Query Formulation.
ACM Trans. Comput. Educ., 2018

Omission of Quality Software Development Practices: A Systematic Literature Review.
ACM Comput. Surv., 2018

Value Co-Creation and Co-Destruction in Online Video Games: An Exploratory Study and Implications for Future Research.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2016
Value Co-Creation and Co-Destruction in an IS Artifact: Contradictions of Geocaching.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

A Participatory Design Program for Making Ethical Choices in Client Vendor Relations in ISD.
Proceedings of the Technology and Intimacy: Choice or Coercion, 2016

2015
Replacing Project Managers in Information Technology Projects: Contradictions that Explain the Phenomenon.
Int. J. Hum. Cap. Inf. Technol. Prof., 2015

How the Replacement of the Project Manager Unfolds in IS Projects.
Proceedings of the Nordic Contributions in IS Research, 2015

Continuous Requirements Risk Profiling in Information Systems Development.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Value Co-Creation for Cyber-Physical Systems in Mining and Construction Industry.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2013
Co-creation of Value for IT-Enabled Services: A Case of Geocaching.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Project-Based Learning in Industry-University Collaboration - Three Normative Models.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
What Makes Information System Developers Produce Defective Information Systems For Their Clients?
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

Replacement of Project Manager during IT Projects - A Research Agenda.
Proceedings of the 18th Americas Conference on Information Systems, 2012

Project-Based IT Companies and Three Corporate Moral Dilemmas.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
The Effects of Teaching the Universality Thesis on Students' Integrative Complexity of Thought.
J. Inf. Syst. Educ., 2011

Gray-Area Phenomenon In Information Systems Development: A Call For Research.
Proceedings of the Pacific Asia Conference on Information Systems, 2011

2010
On IS Students' Intentions to Use Theories of Ethics in Resolving Moral Conflicts.
J. Inf. Syst. Educ., 2010

Moral conflicts in project-based learning in ISD.
Inf. Technol. People, 2010

Replacing Project Manager: Reasons of Replacement Interpreted through the Activity Theory.
Proceedings of the Pacific Asia Conference on Information Systems, 2010

2009
Moral Problems Perceived by Industry in Collaboration with a Student Group: Balancing between Beneficial Objectives and Upholding Relations.
J. Inf. Syst. Educ., 2009

What levels of moral reasoning and values explain adherence to information security rules? An empirical study.
Eur. J. Inf. Syst., 2009

Educating IT Project Managers through Project-Based Learning: A Working-Life Perspective.
Commun. Assoc. Inf. Syst., 2009

Replacement of the Project Manager Reflected Through Activity Theory and Work-System Theory.
Proceedings of the Information Systems Development, 2009

A Social Contract for University-Industry Collaboration: A Case of Project-Based Learning Environment.
Proceedings of the Information Systems Development, 2009

2008
Four Levels of Moral Conflict in ISD.
Proceedings of the Information Systems Development, 2008

2007
Unauthorized copying of software: an empirical study of reasons for and against.
SIGCAS Comput. Soc., 2007

Moral Conflicts in Teaching Project Work: A Job Burdened by Role Strains.
Commun. Assoc. Inf. Syst., 2007

Morally Successful IT Projects.
Proceedings of the Information Systems Development, 2007

Replacing the Project Manager in Information System Projects: What Knowledge Should be Transferred?
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Moral conflicts perceived by students of a project course.
Proceedings of the 6th Baltic Sea Conference on Computing Education Research, 2006

Developing social responsibility of members of ISD project teams.
Proceedings of the Fourteenth European Conference on Information Systems, 2006

2005
Attitudes to and factors affecting unauthorized copying of computer software in Finland.
Behav. Inf. Technol., 2005

2004
Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice.
Inf. Syst. J., 2004

Defects, Usefulness and Usability of Ethics Theories in IS Ethics Education.
Proceedings of the ICEIS 2004, 2004

2003
A Study of Computer Science Students' Ethical Attitudes and Its Implications to.
SIGCAS Comput. Soc., 2003

Universality thesis in IS ethics education - an empirical study.
Proceedings of the 11th European Conference on Information Systems, 2003

2002
Teaching End-User Ethics: Issues and a Solution Based on Universalizability.
Commun. Assoc. Inf. Syst., 2002

2001
End-User Ethics Teaching: Issues and a Solution based on Universalization.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001


  Loading...