Shadow IT S Haag, A Eckhardt Business & Information Systems Engineering 59 (6), 469-473, 2017 | 98 | 2017 |
Protection motivation theory in information systems security research: A review of the past and a road map for the future S Haag, M Siponen, F Liu ACM SIGMIS Database: the DATABASE for Advances in Information Systems 52 (2 …, 2021 | 78 | 2021 |
Organizational Inertia as Barrier to Firms’ IT Adoption–Multidimensional Scale Development and Validation S Haag | 71 | 2014 |
Literature Reviews in IS Research: What Can Be Learnt from the Past and Other Fields? G Schryen, A Benlian, F Rowe, G Shirley, K Larsen, S Petter, G Paré, ... Communications of the AIS, 2017 | 70 | 2017 |
Organizational cloud service adoption: a scientometric and content-based literature analysis S Haag, A Eckhardt Journal of Business Economics 84 (3), 407-440, 2014 | 64 | 2014 |
Normalizing the Shadows–The Role of Symbolic Models for Individuals’ Shadow IT Usage S Haag, A Eckhardt | 61 | 2014 |
Are Shadow System Users the Better IS Users?–Insights of a Lab Experiment S Haag, A Eckhardt, C Bozoyan | 59 | 2015 |
Digitale Zwillinge–Eine explorative Fallstudie zur Untersuchung von Geschäftsmodellen R Klostermeier, S Haag, A Benlian HMD Praxis der Wirtschaftsinformatik: Vol. 55, No. 2, 2018 | 49 | 2018 |
Appearance of Dark Clouds?-An Empirical Analysis of Users' Shadow Sourcing of Cloud Services. S Haag Wirtschaftsinformatik, 1438-1452, 2015 | 47 | 2015 |
Organizational resistance to e-invoicing–Results from an empirical investigation among SMEs S Haag, F Born, S Kreuzer, S Bernius Electronic Government: 12th IFIP WG 8.5 International Conference, EGOV 2013 …, 2013 | 47 | 2013 |
Geschäftsmodelle digitaler zwillinge R Klostermeier, S Haag, A Benlian Geschäftsmodelle digitaler Zwillinge: HMD Best Paper Award 2018, 1-35, 2020 | 40 | 2020 |
Justifying Shadow IT Usage S Haag, A Eckhardt Proceedings of the 19th Pacific Asia Conference on Information Systems …, 2015 | 39 | 2015 |
The Acceptance of Justifications among Shadow IT Users and Nonusers–An Empirical Analysis S Haag, A Eckhardt, A Schwarz Information & Management 56 (5), 731-741, 2019 | 35 | 2019 |
How Information Security Requirements Stress Employees C Ament, S Haag | 24 | 2016 |
Sensitizing Employees’ Corporate IS Security Risk Perception S Haag, A Eckhardt | 23 | 2014 |
From the Ground to the Cloud - A Structured Literature Analysis of the Cloud Service Landscape around the Public and Private Sector S Haag, A Eckhardt, J Krönung 2014 47th Hawaii International Conference on System Sciences, 2127-2136, 2014 | 12 | 2014 |
Deviant Affordances: When Tensions, Deadlocks, and Nonconformance Generate Performance S Haag, A Eckhardt, V Venkatesh Management Information Systems Quarterly 46 (4), 2111-2162, 2022 | 11* | 2022 |
Security-related Stress - A Neglected Construct Information Systems Stress literature C Ament, S Haag | 8 | 2016 |
Freedom of Technology Choice: An Experimental Evaluation M Klesel, S Haag, FM Oschinsky, K Ortbach | 7 | 2019 |
Who is to blame? How too much information threatens users' IS continuance - an experimental analysis S Wallbach, S Haag 26th European Conference on Information Systems, 2018 | 7* | 2018 |